Analysis
-
max time kernel
163s -
max time network
194s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06-12-2022 16:48
Static task
static1
Behavioral task
behavioral1
Sample
ed95b1a888710f3ca4acacb49250fb6c21722e2882e31784bd2049d15f97d4de.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ed95b1a888710f3ca4acacb49250fb6c21722e2882e31784bd2049d15f97d4de.exe
Resource
win10v2004-20221111-en
General
-
Target
ed95b1a888710f3ca4acacb49250fb6c21722e2882e31784bd2049d15f97d4de.exe
-
Size
698KB
-
MD5
bbb445901d3ec280951ac12132afd87c
-
SHA1
48146b81b85e41b67489f2c20a4e38cb10d1c778
-
SHA256
ed95b1a888710f3ca4acacb49250fb6c21722e2882e31784bd2049d15f97d4de
-
SHA512
5c7c7b02d57a6275149baa67ee3568a2f9fd0d086b3953da20ea552bf1d43845afc3dc6b082d7a0a2557b7560e344cba73d317e0f59c7aa91a55ea9953c69f65
-
SSDEEP
12288:PPgcwGZdeZ0wIo9e1dYiJQgajJRfswX5B:PYlEu0wIMNiugqEq
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Executes dropped EXE 2 IoCs
Processes:
Avywuixyxmexxtr.exeAvywuixyxmexxtr.exepid process 2036 Avywuixyxmexxtr.exe 884 Avywuixyxmexxtr.exe -
Deletes itself 1 IoCs
Processes:
Avywuixyxmexxtr.exepid process 2036 Avywuixyxmexxtr.exe -
Loads dropped DLL 2 IoCs
Processes:
ed95b1a888710f3ca4acacb49250fb6c21722e2882e31784bd2049d15f97d4de.exepid process 1236 ed95b1a888710f3ca4acacb49250fb6c21722e2882e31784bd2049d15f97d4de.exe 1236 ed95b1a888710f3ca4acacb49250fb6c21722e2882e31784bd2049d15f97d4de.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
Avywuixyxmexxtr.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run Avywuixyxmexxtr.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce Avywuixyxmexxtr.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\*CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
ed95b1a888710f3ca4acacb49250fb6c21722e2882e31784bd2049d15f97d4de.exeAvywuixyxmexxtr.exedescription pid process target process PID 1236 wrote to memory of 2036 1236 ed95b1a888710f3ca4acacb49250fb6c21722e2882e31784bd2049d15f97d4de.exe Avywuixyxmexxtr.exe PID 1236 wrote to memory of 2036 1236 ed95b1a888710f3ca4acacb49250fb6c21722e2882e31784bd2049d15f97d4de.exe Avywuixyxmexxtr.exe PID 1236 wrote to memory of 2036 1236 ed95b1a888710f3ca4acacb49250fb6c21722e2882e31784bd2049d15f97d4de.exe Avywuixyxmexxtr.exe PID 1236 wrote to memory of 2036 1236 ed95b1a888710f3ca4acacb49250fb6c21722e2882e31784bd2049d15f97d4de.exe Avywuixyxmexxtr.exe PID 2036 wrote to memory of 884 2036 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe PID 2036 wrote to memory of 884 2036 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe PID 2036 wrote to memory of 884 2036 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe PID 2036 wrote to memory of 884 2036 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed95b1a888710f3ca4acacb49250fb6c21722e2882e31784bd2049d15f97d4de.exe"C:\Users\Admin\AppData\Local\Temp\ed95b1a888710f3ca4acacb49250fb6c21722e2882e31784bd2049d15f97d4de.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" "-rC:\Users\Admin\AppData\Local\Temp\ed95b1a888710f3ca4acacb49250fb6c21722e2882e31784bd2049d15f97d4de.exe"2⤵
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" -w1203⤵
- Executes dropped EXE
PID:884
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
698KB
MD5bbb445901d3ec280951ac12132afd87c
SHA148146b81b85e41b67489f2c20a4e38cb10d1c778
SHA256ed95b1a888710f3ca4acacb49250fb6c21722e2882e31784bd2049d15f97d4de
SHA5125c7c7b02d57a6275149baa67ee3568a2f9fd0d086b3953da20ea552bf1d43845afc3dc6b082d7a0a2557b7560e344cba73d317e0f59c7aa91a55ea9953c69f65
-
Filesize
698KB
MD5bbb445901d3ec280951ac12132afd87c
SHA148146b81b85e41b67489f2c20a4e38cb10d1c778
SHA256ed95b1a888710f3ca4acacb49250fb6c21722e2882e31784bd2049d15f97d4de
SHA5125c7c7b02d57a6275149baa67ee3568a2f9fd0d086b3953da20ea552bf1d43845afc3dc6b082d7a0a2557b7560e344cba73d317e0f59c7aa91a55ea9953c69f65
-
Filesize
698KB
MD5bbb445901d3ec280951ac12132afd87c
SHA148146b81b85e41b67489f2c20a4e38cb10d1c778
SHA256ed95b1a888710f3ca4acacb49250fb6c21722e2882e31784bd2049d15f97d4de
SHA5125c7c7b02d57a6275149baa67ee3568a2f9fd0d086b3953da20ea552bf1d43845afc3dc6b082d7a0a2557b7560e344cba73d317e0f59c7aa91a55ea9953c69f65
-
Filesize
698KB
MD5bbb445901d3ec280951ac12132afd87c
SHA148146b81b85e41b67489f2c20a4e38cb10d1c778
SHA256ed95b1a888710f3ca4acacb49250fb6c21722e2882e31784bd2049d15f97d4de
SHA5125c7c7b02d57a6275149baa67ee3568a2f9fd0d086b3953da20ea552bf1d43845afc3dc6b082d7a0a2557b7560e344cba73d317e0f59c7aa91a55ea9953c69f65
-
Filesize
698KB
MD5bbb445901d3ec280951ac12132afd87c
SHA148146b81b85e41b67489f2c20a4e38cb10d1c778
SHA256ed95b1a888710f3ca4acacb49250fb6c21722e2882e31784bd2049d15f97d4de
SHA5125c7c7b02d57a6275149baa67ee3568a2f9fd0d086b3953da20ea552bf1d43845afc3dc6b082d7a0a2557b7560e344cba73d317e0f59c7aa91a55ea9953c69f65