Malware Analysis Report

2024-10-16 03:26

Sample ID 231225-qc14sahfd2
Target 208c45f500c299bc4ebd80d1e230cc41
SHA256 97820cf8de59555d2d333ac724c6a72c610b8c537f35139ebb1a5a362e68f789
Tags
avoslocker ransomware
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

97820cf8de59555d2d333ac724c6a72c610b8c537f35139ebb1a5a362e68f789

Threat Level: Known bad

The file 208c45f500c299bc4ebd80d1e230cc41 was found to be: Known bad.

Malicious Activity Summary

avoslocker ransomware

Avoslocker Ransomware

Renames multiple (96) files with added filename extension

Unsigned PE

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2023-12-25 13:07

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-12-25 13:07

Reported

2023-12-28 09:32

Platform

win7-20231215-en

Max time kernel

122s

Max time network

126s

Command Line

"C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe"

Signatures

Avoslocker Ransomware

ransomware avoslocker

Renames multiple (96) files with added filename extension

ransomware

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe

"C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe"

Network

N/A

Files

F:\$RECYCLE.BIN\S-1-5-21-1603059206-2004189698-4139800220-1000\GET_YOUR_FILES_BACK.txt

MD5 0454a42a44d0ac06b736c1c8ea701738
SHA1 7b32fec0e0063f0f9cf7b10aa7aa88e04be6d049
SHA256 bb344c93d0894b33ec20752eebb8917e79df6d92d4be5c9c9610e596e6df26a7
SHA512 1a6f8d5b58cb5cc93350341d72a0a83dd86531e528155f51961aea3e94d17cb8a58513efd7b616af3ac2dffb4ed074fe3a0b150551d5f4540f269b86d00026f5

Analysis: behavioral2

Detonation Overview

Submitted

2023-12-25 13:07

Reported

2023-12-28 09:32

Platform

win10v2004-20231215-en

Max time kernel

17s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe"

Signatures

Avoslocker Ransomware

ransomware avoslocker

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe

"C:\Users\Admin\AppData\Local\Temp\208c45f500c299bc4ebd80d1e230cc41.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.200:443 g.bing.com tcp
US 8.8.8.8:53 59.128.231.4.in-addr.arpa udp
US 8.8.8.8:53 73.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 194.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 208.194.73.20.in-addr.arpa udp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 41.110.16.96.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 104.241.123.92.in-addr.arpa udp
US 8.8.8.8:53 119.110.54.20.in-addr.arpa udp
US 8.8.8.8:53 0.204.248.87.in-addr.arpa udp
US 8.8.8.8:53 217.135.221.88.in-addr.arpa udp
US 8.8.8.8:53 32.134.221.88.in-addr.arpa udp
US 8.8.8.8:53 211.135.221.88.in-addr.arpa udp
IE 20.223.35.26:443 tcp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 204.79.197.200:443 g.bing.com tcp
US 204.79.197.200:443 g.bing.com tcp
NL 52.142.223.178:80 tcp
US 93.184.221.240:80 tcp
US 93.184.221.240:80 tcp

Files

C:\PerfLogs\GET_YOUR_FILES_BACK.txt

MD5 0454a42a44d0ac06b736c1c8ea701738
SHA1 7b32fec0e0063f0f9cf7b10aa7aa88e04be6d049
SHA256 bb344c93d0894b33ec20752eebb8917e79df6d92d4be5c9c9610e596e6df26a7
SHA512 1a6f8d5b58cb5cc93350341d72a0a83dd86531e528155f51961aea3e94d17cb8a58513efd7b616af3ac2dffb4ed074fe3a0b150551d5f4540f269b86d00026f5