Analysis
-
max time kernel
178s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 16:48
Static task
static1
Behavioral task
behavioral1
Sample
ed95b1a888710f3ca4acacb49250fb6c21722e2882e31784bd2049d15f97d4de.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ed95b1a888710f3ca4acacb49250fb6c21722e2882e31784bd2049d15f97d4de.exe
Resource
win10v2004-20221111-en
General
-
Target
ed95b1a888710f3ca4acacb49250fb6c21722e2882e31784bd2049d15f97d4de.exe
-
Size
698KB
-
MD5
bbb445901d3ec280951ac12132afd87c
-
SHA1
48146b81b85e41b67489f2c20a4e38cb10d1c778
-
SHA256
ed95b1a888710f3ca4acacb49250fb6c21722e2882e31784bd2049d15f97d4de
-
SHA512
5c7c7b02d57a6275149baa67ee3568a2f9fd0d086b3953da20ea552bf1d43845afc3dc6b082d7a0a2557b7560e344cba73d317e0f59c7aa91a55ea9953c69f65
-
SSDEEP
12288:PPgcwGZdeZ0wIo9e1dYiJQgajJRfswX5B:PYlEu0wIMNiugqEq
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Executes dropped EXE 2 IoCs
Processes:
Avywuixyxmexxtr.exeAvywuixyxmexxtr.exepid process 3136 Avywuixyxmexxtr.exe 1700 Avywuixyxmexxtr.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
Avywuixyxmexxtr.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce Avywuixyxmexxtr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\*CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run Avywuixyxmexxtr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
ed95b1a888710f3ca4acacb49250fb6c21722e2882e31784bd2049d15f97d4de.exeAvywuixyxmexxtr.exedescription pid process target process PID 632 wrote to memory of 3136 632 ed95b1a888710f3ca4acacb49250fb6c21722e2882e31784bd2049d15f97d4de.exe Avywuixyxmexxtr.exe PID 632 wrote to memory of 3136 632 ed95b1a888710f3ca4acacb49250fb6c21722e2882e31784bd2049d15f97d4de.exe Avywuixyxmexxtr.exe PID 632 wrote to memory of 3136 632 ed95b1a888710f3ca4acacb49250fb6c21722e2882e31784bd2049d15f97d4de.exe Avywuixyxmexxtr.exe PID 3136 wrote to memory of 1700 3136 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe PID 3136 wrote to memory of 1700 3136 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe PID 3136 wrote to memory of 1700 3136 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed95b1a888710f3ca4acacb49250fb6c21722e2882e31784bd2049d15f97d4de.exe"C:\Users\Admin\AppData\Local\Temp\ed95b1a888710f3ca4acacb49250fb6c21722e2882e31784bd2049d15f97d4de.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" "-rC:\Users\Admin\AppData\Local\Temp\ed95b1a888710f3ca4acacb49250fb6c21722e2882e31784bd2049d15f97d4de.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" -w2643⤵
- Executes dropped EXE
PID:1700
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
698KB
MD5bbb445901d3ec280951ac12132afd87c
SHA148146b81b85e41b67489f2c20a4e38cb10d1c778
SHA256ed95b1a888710f3ca4acacb49250fb6c21722e2882e31784bd2049d15f97d4de
SHA5125c7c7b02d57a6275149baa67ee3568a2f9fd0d086b3953da20ea552bf1d43845afc3dc6b082d7a0a2557b7560e344cba73d317e0f59c7aa91a55ea9953c69f65
-
Filesize
698KB
MD5bbb445901d3ec280951ac12132afd87c
SHA148146b81b85e41b67489f2c20a4e38cb10d1c778
SHA256ed95b1a888710f3ca4acacb49250fb6c21722e2882e31784bd2049d15f97d4de
SHA5125c7c7b02d57a6275149baa67ee3568a2f9fd0d086b3953da20ea552bf1d43845afc3dc6b082d7a0a2557b7560e344cba73d317e0f59c7aa91a55ea9953c69f65
-
Filesize
698KB
MD5bbb445901d3ec280951ac12132afd87c
SHA148146b81b85e41b67489f2c20a4e38cb10d1c778
SHA256ed95b1a888710f3ca4acacb49250fb6c21722e2882e31784bd2049d15f97d4de
SHA5125c7c7b02d57a6275149baa67ee3568a2f9fd0d086b3953da20ea552bf1d43845afc3dc6b082d7a0a2557b7560e344cba73d317e0f59c7aa91a55ea9953c69f65