Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 12:24
Static task
static1
Behavioral task
behavioral1
Sample
8bd61c883e9ffc637c7dd0bf7ab93d6b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8bd61c883e9ffc637c7dd0bf7ab93d6b.exe
Resource
win10v2004-20231215-en
General
-
Target
8bd61c883e9ffc637c7dd0bf7ab93d6b.exe
-
Size
696KB
-
MD5
8bd61c883e9ffc637c7dd0bf7ab93d6b
-
SHA1
fd2fcc0d26d4aff9adbed3b57befb2568222ff38
-
SHA256
60f4de6a343a174eebb2455834b4333103d0159b5a975f793e98b91bcc96594a
-
SHA512
e37e32b1bf6b6a63ec02855cf540d7c188b308c332efd63b82a32b2344b7d8d0fdd9a2eade329d7ac682a2ab4133dac19fbf2c1a5bdb2d6d6b37402a4628bd49
-
SSDEEP
12288:IsmFRVtoSeN6hocevUGQ8zRNXnf8HWpKKXNAh/gEHjE:IsgvEVcevrsiKmWh/g+
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Deletes itself 1 IoCs
Processes:
Avywuixyxmexxtr.exepid process 2592 Avywuixyxmexxtr.exe -
Executes dropped EXE 2 IoCs
Processes:
Avywuixyxmexxtr.exeAvywuixyxmexxtr.exepid process 2592 Avywuixyxmexxtr.exe 2952 Avywuixyxmexxtr.exe -
Loads dropped DLL 2 IoCs
Processes:
8bd61c883e9ffc637c7dd0bf7ab93d6b.exepid process 2100 8bd61c883e9ffc637c7dd0bf7ab93d6b.exe 2100 8bd61c883e9ffc637c7dd0bf7ab93d6b.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Avywuixyxmexxtr.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\*CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
8bd61c883e9ffc637c7dd0bf7ab93d6b.exeAvywuixyxmexxtr.exedescription pid process target process PID 2100 wrote to memory of 2592 2100 8bd61c883e9ffc637c7dd0bf7ab93d6b.exe Avywuixyxmexxtr.exe PID 2100 wrote to memory of 2592 2100 8bd61c883e9ffc637c7dd0bf7ab93d6b.exe Avywuixyxmexxtr.exe PID 2100 wrote to memory of 2592 2100 8bd61c883e9ffc637c7dd0bf7ab93d6b.exe Avywuixyxmexxtr.exe PID 2100 wrote to memory of 2592 2100 8bd61c883e9ffc637c7dd0bf7ab93d6b.exe Avywuixyxmexxtr.exe PID 2592 wrote to memory of 2952 2592 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe PID 2592 wrote to memory of 2952 2592 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe PID 2592 wrote to memory of 2952 2592 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe PID 2592 wrote to memory of 2952 2592 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8bd61c883e9ffc637c7dd0bf7ab93d6b.exe"C:\Users\Admin\AppData\Local\Temp\8bd61c883e9ffc637c7dd0bf7ab93d6b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" "-rC:\Users\Admin\AppData\Local\Temp\8bd61c883e9ffc637c7dd0bf7ab93d6b.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" -w12c3⤵
- Executes dropped EXE
PID:2952
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
696KB
MD58bd61c883e9ffc637c7dd0bf7ab93d6b
SHA1fd2fcc0d26d4aff9adbed3b57befb2568222ff38
SHA25660f4de6a343a174eebb2455834b4333103d0159b5a975f793e98b91bcc96594a
SHA512e37e32b1bf6b6a63ec02855cf540d7c188b308c332efd63b82a32b2344b7d8d0fdd9a2eade329d7ac682a2ab4133dac19fbf2c1a5bdb2d6d6b37402a4628bd49