Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2023 12:24
Static task
static1
Behavioral task
behavioral1
Sample
8bd61c883e9ffc637c7dd0bf7ab93d6b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8bd61c883e9ffc637c7dd0bf7ab93d6b.exe
Resource
win10v2004-20231215-en
General
-
Target
8bd61c883e9ffc637c7dd0bf7ab93d6b.exe
-
Size
696KB
-
MD5
8bd61c883e9ffc637c7dd0bf7ab93d6b
-
SHA1
fd2fcc0d26d4aff9adbed3b57befb2568222ff38
-
SHA256
60f4de6a343a174eebb2455834b4333103d0159b5a975f793e98b91bcc96594a
-
SHA512
e37e32b1bf6b6a63ec02855cf540d7c188b308c332efd63b82a32b2344b7d8d0fdd9a2eade329d7ac682a2ab4133dac19fbf2c1a5bdb2d6d6b37402a4628bd49
-
SSDEEP
12288:IsmFRVtoSeN6hocevUGQ8zRNXnf8HWpKKXNAh/gEHjE:IsgvEVcevrsiKmWh/g+
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Deletes itself 1 IoCs
pid Process 836 Avywuixyxmexxtr.exe -
Executes dropped EXE 2 IoCs
pid Process 836 Avywuixyxmexxtr.exe 2932 Avywuixyxmexxtr.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\*CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1700 wrote to memory of 836 1700 8bd61c883e9ffc637c7dd0bf7ab93d6b.exe 89 PID 1700 wrote to memory of 836 1700 8bd61c883e9ffc637c7dd0bf7ab93d6b.exe 89 PID 1700 wrote to memory of 836 1700 8bd61c883e9ffc637c7dd0bf7ab93d6b.exe 89 PID 836 wrote to memory of 2932 836 Avywuixyxmexxtr.exe 90 PID 836 wrote to memory of 2932 836 Avywuixyxmexxtr.exe 90 PID 836 wrote to memory of 2932 836 Avywuixyxmexxtr.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\8bd61c883e9ffc637c7dd0bf7ab93d6b.exe"C:\Users\Admin\AppData\Local\Temp\8bd61c883e9ffc637c7dd0bf7ab93d6b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" "-rC:\Users\Admin\AppData\Local\Temp\8bd61c883e9ffc637c7dd0bf7ab93d6b.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" -w26c3⤵
- Executes dropped EXE
PID:2932
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
696KB
MD58bd61c883e9ffc637c7dd0bf7ab93d6b
SHA1fd2fcc0d26d4aff9adbed3b57befb2568222ff38
SHA25660f4de6a343a174eebb2455834b4333103d0159b5a975f793e98b91bcc96594a
SHA512e37e32b1bf6b6a63ec02855cf540d7c188b308c332efd63b82a32b2344b7d8d0fdd9a2eade329d7ac682a2ab4133dac19fbf2c1a5bdb2d6d6b37402a4628bd49