Analysis
-
max time kernel
158s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 19:57
Static task
static1
Behavioral task
behavioral1
Sample
9ec4697891cc6c9add803044a29bdd9d05701509b9eddc370d4caf00c15ef734.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9ec4697891cc6c9add803044a29bdd9d05701509b9eddc370d4caf00c15ef734.exe
Resource
win10v2004-20220812-en
General
-
Target
9ec4697891cc6c9add803044a29bdd9d05701509b9eddc370d4caf00c15ef734.exe
-
Size
355KB
-
MD5
de400607d06b41a6f8b0935c3607541d
-
SHA1
f9924a0eb4e715f2c5e370235d39f295b6f95aa8
-
SHA256
9ec4697891cc6c9add803044a29bdd9d05701509b9eddc370d4caf00c15ef734
-
SHA512
4c7949096a20017489635d5440ab46513ccf12fe9cb57a1a0b0fd609db9ccf624bf1623d254c2adba8c510f4fcda1dc6b521a6b66860f7904cc8baac45f8018e
-
SSDEEP
6144:MzsQe4NQnn7swHWLJwpFHBqZ4IBbe5RJ7GgcbjYkuyfRVnL:MzReciWLMFh4DYRJ7EYklpp
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Executes dropped EXE 2 IoCs
Processes:
Avywuixyxmexxtr.exeAvywuixyxmexxtr.exepid process 1476 Avywuixyxmexxtr.exe 3856 Avywuixyxmexxtr.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
Avywuixyxmexxtr.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce Avywuixyxmexxtr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\*CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run Avywuixyxmexxtr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
9ec4697891cc6c9add803044a29bdd9d05701509b9eddc370d4caf00c15ef734.exeAvywuixyxmexxtr.exedescription pid process target process PID 4452 wrote to memory of 1476 4452 9ec4697891cc6c9add803044a29bdd9d05701509b9eddc370d4caf00c15ef734.exe Avywuixyxmexxtr.exe PID 4452 wrote to memory of 1476 4452 9ec4697891cc6c9add803044a29bdd9d05701509b9eddc370d4caf00c15ef734.exe Avywuixyxmexxtr.exe PID 4452 wrote to memory of 1476 4452 9ec4697891cc6c9add803044a29bdd9d05701509b9eddc370d4caf00c15ef734.exe Avywuixyxmexxtr.exe PID 1476 wrote to memory of 3856 1476 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe PID 1476 wrote to memory of 3856 1476 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe PID 1476 wrote to memory of 3856 1476 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ec4697891cc6c9add803044a29bdd9d05701509b9eddc370d4caf00c15ef734.exe"C:\Users\Admin\AppData\Local\Temp\9ec4697891cc6c9add803044a29bdd9d05701509b9eddc370d4caf00c15ef734.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" "-rC:\Users\Admin\AppData\Local\Temp\9ec4697891cc6c9add803044a29bdd9d05701509b9eddc370d4caf00c15ef734.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" -w2643⤵
- Executes dropped EXE
PID:3856
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
355KB
MD5de400607d06b41a6f8b0935c3607541d
SHA1f9924a0eb4e715f2c5e370235d39f295b6f95aa8
SHA2569ec4697891cc6c9add803044a29bdd9d05701509b9eddc370d4caf00c15ef734
SHA5124c7949096a20017489635d5440ab46513ccf12fe9cb57a1a0b0fd609db9ccf624bf1623d254c2adba8c510f4fcda1dc6b521a6b66860f7904cc8baac45f8018e
-
Filesize
355KB
MD5de400607d06b41a6f8b0935c3607541d
SHA1f9924a0eb4e715f2c5e370235d39f295b6f95aa8
SHA2569ec4697891cc6c9add803044a29bdd9d05701509b9eddc370d4caf00c15ef734
SHA5124c7949096a20017489635d5440ab46513ccf12fe9cb57a1a0b0fd609db9ccf624bf1623d254c2adba8c510f4fcda1dc6b521a6b66860f7904cc8baac45f8018e
-
Filesize
355KB
MD5de400607d06b41a6f8b0935c3607541d
SHA1f9924a0eb4e715f2c5e370235d39f295b6f95aa8
SHA2569ec4697891cc6c9add803044a29bdd9d05701509b9eddc370d4caf00c15ef734
SHA5124c7949096a20017489635d5440ab46513ccf12fe9cb57a1a0b0fd609db9ccf624bf1623d254c2adba8c510f4fcda1dc6b521a6b66860f7904cc8baac45f8018e