Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 09:38
Static task
static1
Behavioral task
behavioral1
Sample
724799e37d6b47dc099caea7aabb0c1246a5041537d425601639d551e42bd425.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
724799e37d6b47dc099caea7aabb0c1246a5041537d425601639d551e42bd425.exe
Resource
win10v2004-20220901-en
General
-
Target
724799e37d6b47dc099caea7aabb0c1246a5041537d425601639d551e42bd425.exe
-
Size
352KB
-
MD5
a93d75cb6f72c1847c3f5afc9c94bbbb
-
SHA1
016409e124f98d565c5a5fa3d3b2428152259df7
-
SHA256
724799e37d6b47dc099caea7aabb0c1246a5041537d425601639d551e42bd425
-
SHA512
ad79d2f68b0b2036794bd047256ed8f9eccd497db7701b5f1b80e7b4388a28774edfa50abf846427aa81b833c0cd970dcd4bd468b05f5d943f5a8f1baa2c00f5
-
SSDEEP
6144:Y3Q7OlkZayQFnE0oqCtBK/OLyUsn07wWQshOBqSTeaybz+ffB:v/rWZoqf/OCPIOMj1P+
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Executes dropped EXE 2 IoCs
Processes:
Avywuixyxmexxtr.exeAvywuixyxmexxtr.exepid process 1420 Avywuixyxmexxtr.exe 1280 Avywuixyxmexxtr.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
Avywuixyxmexxtr.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce Avywuixyxmexxtr.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\*CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run Avywuixyxmexxtr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
724799e37d6b47dc099caea7aabb0c1246a5041537d425601639d551e42bd425.exeAvywuixyxmexxtr.exedescription pid process target process PID 4640 wrote to memory of 1420 4640 724799e37d6b47dc099caea7aabb0c1246a5041537d425601639d551e42bd425.exe Avywuixyxmexxtr.exe PID 4640 wrote to memory of 1420 4640 724799e37d6b47dc099caea7aabb0c1246a5041537d425601639d551e42bd425.exe Avywuixyxmexxtr.exe PID 4640 wrote to memory of 1420 4640 724799e37d6b47dc099caea7aabb0c1246a5041537d425601639d551e42bd425.exe Avywuixyxmexxtr.exe PID 1420 wrote to memory of 1280 1420 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe PID 1420 wrote to memory of 1280 1420 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe PID 1420 wrote to memory of 1280 1420 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\724799e37d6b47dc099caea7aabb0c1246a5041537d425601639d551e42bd425.exe"C:\Users\Admin\AppData\Local\Temp\724799e37d6b47dc099caea7aabb0c1246a5041537d425601639d551e42bd425.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" "-rC:\Users\Admin\AppData\Local\Temp\724799e37d6b47dc099caea7aabb0c1246a5041537d425601639d551e42bd425.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" -w2603⤵
- Executes dropped EXE
PID:1280
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
352KB
MD5a93d75cb6f72c1847c3f5afc9c94bbbb
SHA1016409e124f98d565c5a5fa3d3b2428152259df7
SHA256724799e37d6b47dc099caea7aabb0c1246a5041537d425601639d551e42bd425
SHA512ad79d2f68b0b2036794bd047256ed8f9eccd497db7701b5f1b80e7b4388a28774edfa50abf846427aa81b833c0cd970dcd4bd468b05f5d943f5a8f1baa2c00f5
-
Filesize
352KB
MD5a93d75cb6f72c1847c3f5afc9c94bbbb
SHA1016409e124f98d565c5a5fa3d3b2428152259df7
SHA256724799e37d6b47dc099caea7aabb0c1246a5041537d425601639d551e42bd425
SHA512ad79d2f68b0b2036794bd047256ed8f9eccd497db7701b5f1b80e7b4388a28774edfa50abf846427aa81b833c0cd970dcd4bd468b05f5d943f5a8f1baa2c00f5
-
Filesize
352KB
MD5a93d75cb6f72c1847c3f5afc9c94bbbb
SHA1016409e124f98d565c5a5fa3d3b2428152259df7
SHA256724799e37d6b47dc099caea7aabb0c1246a5041537d425601639d551e42bd425
SHA512ad79d2f68b0b2036794bd047256ed8f9eccd497db7701b5f1b80e7b4388a28774edfa50abf846427aa81b833c0cd970dcd4bd468b05f5d943f5a8f1baa2c00f5