Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06-12-2022 19:57
Static task
static1
Behavioral task
behavioral1
Sample
9ec4697891cc6c9add803044a29bdd9d05701509b9eddc370d4caf00c15ef734.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9ec4697891cc6c9add803044a29bdd9d05701509b9eddc370d4caf00c15ef734.exe
Resource
win10v2004-20220812-en
General
-
Target
9ec4697891cc6c9add803044a29bdd9d05701509b9eddc370d4caf00c15ef734.exe
-
Size
355KB
-
MD5
de400607d06b41a6f8b0935c3607541d
-
SHA1
f9924a0eb4e715f2c5e370235d39f295b6f95aa8
-
SHA256
9ec4697891cc6c9add803044a29bdd9d05701509b9eddc370d4caf00c15ef734
-
SHA512
4c7949096a20017489635d5440ab46513ccf12fe9cb57a1a0b0fd609db9ccf624bf1623d254c2adba8c510f4fcda1dc6b521a6b66860f7904cc8baac45f8018e
-
SSDEEP
6144:MzsQe4NQnn7swHWLJwpFHBqZ4IBbe5RJ7GgcbjYkuyfRVnL:MzReciWLMFh4DYRJ7EYklpp
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Executes dropped EXE 2 IoCs
Processes:
Avywuixyxmexxtr.exeAvywuixyxmexxtr.exepid process 1876 Avywuixyxmexxtr.exe 1568 Avywuixyxmexxtr.exe -
Deletes itself 1 IoCs
Processes:
Avywuixyxmexxtr.exepid process 1876 Avywuixyxmexxtr.exe -
Loads dropped DLL 1 IoCs
Processes:
9ec4697891cc6c9add803044a29bdd9d05701509b9eddc370d4caf00c15ef734.exepid process 828 9ec4697891cc6c9add803044a29bdd9d05701509b9eddc370d4caf00c15ef734.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
Avywuixyxmexxtr.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run Avywuixyxmexxtr.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce Avywuixyxmexxtr.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\*CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
9ec4697891cc6c9add803044a29bdd9d05701509b9eddc370d4caf00c15ef734.exeAvywuixyxmexxtr.exedescription pid process target process PID 828 wrote to memory of 1876 828 9ec4697891cc6c9add803044a29bdd9d05701509b9eddc370d4caf00c15ef734.exe Avywuixyxmexxtr.exe PID 828 wrote to memory of 1876 828 9ec4697891cc6c9add803044a29bdd9d05701509b9eddc370d4caf00c15ef734.exe Avywuixyxmexxtr.exe PID 828 wrote to memory of 1876 828 9ec4697891cc6c9add803044a29bdd9d05701509b9eddc370d4caf00c15ef734.exe Avywuixyxmexxtr.exe PID 828 wrote to memory of 1876 828 9ec4697891cc6c9add803044a29bdd9d05701509b9eddc370d4caf00c15ef734.exe Avywuixyxmexxtr.exe PID 1876 wrote to memory of 1568 1876 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe PID 1876 wrote to memory of 1568 1876 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe PID 1876 wrote to memory of 1568 1876 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe PID 1876 wrote to memory of 1568 1876 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ec4697891cc6c9add803044a29bdd9d05701509b9eddc370d4caf00c15ef734.exe"C:\Users\Admin\AppData\Local\Temp\9ec4697891cc6c9add803044a29bdd9d05701509b9eddc370d4caf00c15ef734.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" "-rC:\Users\Admin\AppData\Local\Temp\9ec4697891cc6c9add803044a29bdd9d05701509b9eddc370d4caf00c15ef734.exe"2⤵
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" -w11c3⤵
- Executes dropped EXE
PID:1568
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
355KB
MD5de400607d06b41a6f8b0935c3607541d
SHA1f9924a0eb4e715f2c5e370235d39f295b6f95aa8
SHA2569ec4697891cc6c9add803044a29bdd9d05701509b9eddc370d4caf00c15ef734
SHA5124c7949096a20017489635d5440ab46513ccf12fe9cb57a1a0b0fd609db9ccf624bf1623d254c2adba8c510f4fcda1dc6b521a6b66860f7904cc8baac45f8018e
-
Filesize
355KB
MD5de400607d06b41a6f8b0935c3607541d
SHA1f9924a0eb4e715f2c5e370235d39f295b6f95aa8
SHA2569ec4697891cc6c9add803044a29bdd9d05701509b9eddc370d4caf00c15ef734
SHA5124c7949096a20017489635d5440ab46513ccf12fe9cb57a1a0b0fd609db9ccf624bf1623d254c2adba8c510f4fcda1dc6b521a6b66860f7904cc8baac45f8018e
-
Filesize
355KB
MD5de400607d06b41a6f8b0935c3607541d
SHA1f9924a0eb4e715f2c5e370235d39f295b6f95aa8
SHA2569ec4697891cc6c9add803044a29bdd9d05701509b9eddc370d4caf00c15ef734
SHA5124c7949096a20017489635d5440ab46513ccf12fe9cb57a1a0b0fd609db9ccf624bf1623d254c2adba8c510f4fcda1dc6b521a6b66860f7904cc8baac45f8018e
-
Filesize
355KB
MD5de400607d06b41a6f8b0935c3607541d
SHA1f9924a0eb4e715f2c5e370235d39f295b6f95aa8
SHA2569ec4697891cc6c9add803044a29bdd9d05701509b9eddc370d4caf00c15ef734
SHA5124c7949096a20017489635d5440ab46513ccf12fe9cb57a1a0b0fd609db9ccf624bf1623d254c2adba8c510f4fcda1dc6b521a6b66860f7904cc8baac45f8018e