Analysis

  • max time kernel
    138s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/03/2024, 13:33

General

  • Target

    8951f45222cbbffc1727d17ff7dd1a46321b1bc5f313f756651ee325bed323eb.exe

  • Size

    759KB

  • MD5

    66eb277fd9fbf5cb77c60ce927d44779

  • SHA1

    4848667fef47431c1ee3ed72889d8fadb008264f

  • SHA256

    8951f45222cbbffc1727d17ff7dd1a46321b1bc5f313f756651ee325bed323eb

  • SHA512

    384c83c9981b9b125423aead064a756e39d79f2d4d167aa3539e833b859249af7d096cd446034ef0043c3fbf882cef8c203468c1059c547a11cafa7d2a26e259

  • SSDEEP

    12288:M+vaLT+52iRk4pI40BIN4C98jPiaj3SxgYfSI9Khr1nMubeAjLNA+eoV/YSL5n7v:M+vaLSAFUI40BINt98jPiSCalI9KFZX7

Malware Config

Extracted

Path

C:\Users\Admin\Desktop\xFT1g_readme_.txt

Family

avaddon

Ransom Note
-------=== Your network has been infected! ===------- ***************** DO NOT DELETE THIS FILE UNTIL ALL YOUR DATA HAVE BEEN RECOVERED ***************** All your documents, photos, databases and other important files have been encrypted and have the extension: .DAcBacAeD You are not able to decrypt it by yourself. But don't worry, we can help you to restore all your files! The only way to restore your files is to buy our special software. Only we can give you this software and only we can restore your files! We have also downloaded a lot of private data from your network. If you do not contact as in a 3 days we will post information about your breach on our public news website (avaddongun7rngel.onion) and after 7 days the whole downloaded info. You can get more information on our page, which is located in a Tor hidden network. How to get to our page -------------------------------------------------------------------------------- | | 1. Download Tor browser - https://www.torproject.org/ | | 2. Install Tor browser | | 3. Open link in Tor browser - avaddonbotrxmuyl.onion | | 4. Follow the instructions on this page | -------------------------------------------------------------------------------- Your ID: -------------------------------------------------------------------------------- MTA2Mi1odWN6b0NIdHNISmxwRGRSVUpOdVdUb2tQNHFjQTB5UzJyRFpNVWkyZi9uejZJUDljUUJadUJuekZwWW8wT05SSnFFeGRqbjB5aDJ0S1U4UmZ4MjhDM1hIaU5yUlVsaWdqYmdOZW4yRXcxd0FocUg5bytQbjRUMnhaa0RsOHBhMWRTYU5NNWNpYWYrdDQxQmUwbFozOC9CVTRuRmoxU2lYekx2WTVKdHZBOHBDTEYvWHByNUxoM2duNFBKU0FsTDFzTzMrTTB6T3grWDVlWk16bjMrMDVrUjNSRHJaTFRtaU1qMFNGYytLUmpBSnpJc20raDNxQjhpQ2hNVGVoNG03NEZURXBTUXg4NWFtajJBSlVPMmJSTnk0WVByTWQ4OVdGWFRDSWVMT011WDFGbFVLNktKMmR3NkE0Um9aOERqZlRWcC9XYm1jazdKTlpYUWxFVU45UVpKVElYdy94U2FwUUJzWlhaeXgvSVBGVm9ab0g1NXpBaG1QR2tVSkt5Wll2VjhLbHpsUTJMbXdZNWY2REY5ZndiQ1BEb1ppTE5ubVNZeDBFazhCQlJEOXkyRTJRUi9zWXlpMDJMRHMzdmp1ek8rVU9NOUUyTUF4NW0razVKV2g3S29KWGtvcHA1ZDJuZnNzbmFzb052T2MzRnAvTExlRWdNbVBqZXhoajN3aFVWZUxUSjQzb2lNY1NlcDY5RWgvUXJvQ2luWS9RMlFiWm1HWnpraDJGREFsaWV3d29zL0JiWkZkN2FIalNsamlyVEJGcjd1UFRIWVFjUDdNQUNCcUt6cUhWVldCZzhROGtTNHFYbEppUFlQQkROZWtBcDZXY3d3ZmhWT3NjRE1NU0QveWlBbEtKU3lIcEtjcmdCTmFoQW11YWxZS0FLQkEya2ZQaDYxVlVubjA2dHFhM1RTc2srbEhaVGJJYkIwM3c0ZXV3c2lBZUFtZCtFc2VoU0FWQU9PZUVDU1A1OUs3MVlNZHYrbzVESXlGbEo5M1c1ZkFUdzdLandxemlPYTBTRnlYZmE3VGZRa2xJa2YxSUdHQ3RuT1JMSUFWTTdKMGs2ZGszVXhHbzh2NjlmekxkbCthL1lLM25jekVEOVpEMjRxd0dXb05oREpHcHlRcTdNb3JxbUlodm9Ua3lqOGxSSEQyVUdTOTRpdUpQN2hhazQrZmtGS2pWZFViS0JjOEdoWCtMWDdLMjRENnY0aGYxWVlVcEZGSFBQVHpVTjVJVDRqVEltRHdSVjQxd0RJckRLZUlUNWROdDh6V1JvZjZEbzRkSnY3ZnBULzFqM25xSFZQKzIxWXhscU9VTVF6SjgvaFEyVHRjZDhSMXViT3B0bkF2RTZsT28vaVRYSG5TVUtON09kL29WRGJEenNyZXVpYW43a0pOM3E5VzhVRW9kbFM3azhXTWwrQllmbWdMRWUvZ01LRDEyQXgxNy9KTUc5WlJrNnpKQkhMLy9mYVk1VTI0NDA0Q0pjOGpZQXFRbTdITHhUSnFyK05WWWhvOTlLNlJZWEw3YWdXNzRDUVhqV0NiUk5mdFBUOU9rdm9HU0txQmtaOWxqS2haOU1BcWtZRTBtbEdMSDF3eEFUdGRYbzUyeCtHckNXTFcxcVh2M2xXNUhuTStMQ0NDUHBQdzNXS1UxUTJ4dkw1N1NyWU1Qc3YvL2hzWjl2Q0diNnc3SHZrblJHemNlOHhkZXA1SGJ5V1RLanoyNDR5ZEFEUHgvRVBuM1hKbVR1UUltMXE3d1ZGVTRqcVdiekwySG9ndmI4K2ZyRmhJdDFzbTFlUzh1bCs4cGJld05VeUgxMjVWKzQ4b2ZiZ3g4S2JvZ0F6SW0xWm1RNWZ3THg5TXpiZTkrSCtuMXBWSjdDN21qVU11Z2tHV2taSWZtb1MrZHd2Titabjk5dW1jaGFxZTVrN0ZSR2EyRmlZN0g2bVNQRjYxUk15OTFENWlDbEc0Yk9sKzYxVTVuUml2MEo1TzVoVUVBdHcxd0l4MnkyTTNDSGtKNUk5S0J4QkJrQWI3QU9SOVNQNWlYMHlPNHdnNGVBU0FXUEZXZzhSQ2RqL2g5ZkkxTGIvTXI1MlZIeEdDOUZ1cmU2R3hIQjNmdnY3NjRxWU9vS3paNlhHVk5XWU9BeE5rdE5rYVF2ZlMvK3FYK1ptd2l2TUl1UT09 -------------------------------------------------------------------------------- * DO NOT TRY TO RECOVER FILES YOURSELF! * DO NOT MODIFY ENCRYPTED FILES! * * * OTHERWISE, YOU MAY LOSE ALL YOUR FILES FOREVER! * * * Kr4s1dojYWR3iKULay9aGyCiHObnNdB
URLs

http://avaddongun7rngel.onion

http://avaddonbotrxmuyl.onion

Extracted

Path

C:\Users\Admin\Desktop\xFT1g_readme_.txt

Family

avaddon

Ransom Note
-------=== Your network has been infected! ===------- ***************** DO NOT DELETE THIS FILE UNTIL ALL YOUR DATA HAVE BEEN RECOVERED ***************** All your documents, photos, databases and other important files have been encrypted and have the extension: .DAcBacAeD You are not able to decrypt it by yourself. But don't worry, we can help you to restore all your files! The only way to restore your files is to buy our special software. Only we can give you this software and only we can restore your files! We have also downloaded a lot of private data from your network. If you do not contact as in a 3 days we will post information about your breach on our public news website (avaddongun7rngel.onion) and after 7 days the whole downloaded info. You can get more information on our page, which is located in a Tor hidden network. How to get to our page -------------------------------------------------------------------------------- | | 1. Download Tor browser - https://www.torproject.org/ | | 2. Install Tor browser | | 3. Open link in Tor browser - avaddonbotrxmuyl.onion | | 4. Follow the instructions on this page | -------------------------------------------------------------------------------- Your ID: -------------------------------------------------------------------------------- MTA2Mi1odWN6b0NIdHNISmxwRGRSVUpOdVdUb2tQNHFjQTB5UzJyRFpNVWkyZi9uejZJUDljUUJadUJuekZwWW8wT05SSnFFeGRqbjB5aDJ0S1U4UmZ4MjhDM1hIaU5yUlVsaWdqYmdOZW4yRXcxd0FocUg5bytQbjRUMnhaa0RsOHBhMWRTYU5NNWNpYWYrdDQxQmUwbFozOC9CVTRuRmoxU2lYekx2WTVKdHZBOHBDTEYvWHByNUxoM2duNFBKU0FsTDFzTzMrTTB6T3grWDVlWk16bjMrMDVrUjNSRHJaTFRtaU1qMFNGYytLUmpBSnpJc20raDNxQjhpQ2hNVGVoNG03NEZURXBTUXg4NWFtajJBSlVPMmJSTnk0WVByTWQ4OVdGWFRDSWVMT011WDFGbFVLNktKMmR3NkE0Um9aOERqZlRWcC9XYm1jazdKTlpYUWxFVU45UVpKVElYdy94U2FwUUJzWlhaeXgvSVBGVm9ab0g1NXpBaG1QR2tVSkt5Wll2VjhLbHpsUTJMbXdZNWY2REY5ZndiQ1BEb1ppTE5ubVNZeDBFazhCQlJEOXkyRTJRUi9zWXlpMDJMRHMzdmp1ek8rVU9NOUUyTUF4NW0razVKV2g3S29KWGtvcHA1ZDJuZnNzbmFzb052T2MzRnAvTExlRWdNbVBqZXhoajN3aFVWZUxUSjQzb2lNY1NlcDY5RWgvUXJvQ2luWS9RMlFiWm1HWnpraDJGREFsaWV3d29zL0JiWkZkN2FIalNsamlyVEJGcjd1UFRIWVFjUDdNQUNCcUt6cUhWVldCZzhROGtTNHFYbEppUFlQQkROZWtBcDZXY3d3ZmhWT3NjRE1NU0QveWlBbEtKU3lIcEtjcmdCTmFoQW11YWxZS0FLQkEya2ZQaDYxVlVubjA2dHFhM1RTc2srbEhaVGJJYkIwM3c0ZXV3c2lBZUFtZCtFc2VoU0FWQU9PZUVDU1A1OUs3MVlNZHYrbzVESXlGbEo5M1c1ZkFUdzdLandxemlPYTBTRnlYZmE3VGZRa2xJa2YxSUdHQ3RuT1JMSUFWTTdKMGs2ZGszVXhHbzh2NjlmekxkbCthL1lLM25jekVEOVpEMjRxd0dXb05oREpHcHlRcTdNb3JxbUlodm9Ua3lqOGxSSEQyVUdTOTRpdUpQN2hhazQrZmtGS2pWZFViS0JjOEdoWCtMWDdLMjRENnY0aGYxWVlVcEZGSFBQVHpVTjVJVDRqVEltRHdSVjQxd0RJckRLZUlUNWROdDh6V1JvZjZEbzRkSnY3ZnBULzFqM25xSFZQKzIxWXhscU9VTVF6SjgvaFEyVHRjZDhSMXViT3B0bkF2RTZsT28vaVRYSG5TVUtON09kL29WRGJEenNyZXVpYW43a0pOM3E5VzhVRW9kbFM3azhXTWwrQllmbWdMRWUvZ01LRDEyQXgxNy9KTUc5WlJrNnpKQkhMLy9mYVk1VTI0NDA0Q0pjOGpZQXFRbTdITHhUSnFyK05WWWhvOTlLNlJZWEw3YWdXNzRDUVhqV0NiUk5mdFBUOU9rdm9HU0txQmtaOWxqS2haOU1BcWtZRTBtbEdMSDF3eEFUdGRYbzUyeCtHckNXTFcxcVh2M2xXNUhuTStMQ0NDUHBQdzNXS1UxUTJ4dkw1N1NyWU1Qc3YvL2hzWjl2Q0diNnc3SHZrblJHemNlOHhkZXA1SGJ5V1RLanoyNDR5ZEFEUHgvRVBuM1hKbVR1UUltMXE3d1ZGVTRqcVdiekwySG9ndmI4K2ZyRmhJdDFzbTFlUzh1bCs4cGJld05VeUgxMjVWKzQ4b2ZiZ3g4S2JvZ0F6SW0xWm1RNWZ3THg5TXpiZTkrSCtuMXBWSjdDN21qVU11Z2tHV2taSWZtb1MrZHd2Titabjk5dW1jaGFxZTVrN0ZSR2EyRmlZN0g2bVNQRjYxUk15OTFENWlDbEc0Yk9sKzYxVTVuUml2MEo1TzVoVUVBdHcxd0l4MnkyTTNDSGtKNUk5S0J4QkJrQWI3QU9SOVNQNWlYMHlPNHdnNGVBU0FXUEZXZzhSQ2RqL2g5ZkkxTGIvTXI1MlZIeEdDOUZ1cmU2R3hIQjNmdnY3NjRxWU9vS3paNlhHVk5XWU9BeE5rdE5rYVF2ZlMvK3FYK1ptd2l2TUl1UT09 -------------------------------------------------------------------------------- * DO NOT TRY TO RECOVER FILES YOURSELF! * DO NOT MODIFY ENCRYPTED FILES! * * * OTHERWISE, YOU MAY LOSE ALL YOUR FILES FOREVER! * * * Azg
URLs

http://avaddongun7rngel.onion

http://avaddonbotrxmuyl.onion

Signatures

  • Avaddon

    Ransomware-as-a-service first released in June 2020 and currently expanding its userbase among criminal actors.

  • Avaddon payload 1 IoCs
  • Process spawned unexpected child process 3 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 2 IoCs
  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (166) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Executes dropped EXE 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • System policy modification 1 TTPs 3 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8951f45222cbbffc1727d17ff7dd1a46321b1bc5f313f756651ee325bed323eb.exe
    "C:\Users\Admin\AppData\Local\Temp\8951f45222cbbffc1727d17ff7dd1a46321b1bc5f313f756651ee325bed323eb.exe"
    1⤵
    • UAC bypass
    • Checks whether UAC is enabled
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1620
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      wmic SHADOWCOPY DELETE /nointeractive
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3856
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      wmic SHADOWCOPY DELETE /nointeractive
      2⤵
        PID:4576
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic SHADOWCOPY DELETE /nointeractive
        2⤵
          PID:4592
      • C:\Windows\system32\wbem\wmic.exe
        wmic SHADOWCOPY DELETE /nointeractive
        1⤵
        • Process spawned unexpected child process
        • Suspicious use of AdjustPrivilegeToken
        PID:856
      • C:\Windows\system32\wbem\wmic.exe
        wmic SHADOWCOPY DELETE /nointeractive
        1⤵
        • Process spawned unexpected child process
        • Suspicious use of AdjustPrivilegeToken
        PID:2860
      • C:\Windows\system32\wbem\wmic.exe
        wmic SHADOWCOPY DELETE /nointeractive
        1⤵
        • Process spawned unexpected child process
        • Suspicious use of AdjustPrivilegeToken
        PID:1240
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
          PID:5028
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\8951f45222cbbffc1727d17ff7dd1a46321b1bc5f313f756651ee325bed323eb.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Windows\8951f45222cbbffc1727d17ff7dd1a46321b1bc5f313f756651ee325bed323eb.exe
          1⤵
          • Executes dropped EXE
          PID:3756
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\8951f45222cbbffc1727d17ff7dd1a46321b1bc5f313f756651ee325bed323eb.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Windows\8951f45222cbbffc1727d17ff7dd1a46321b1bc5f313f756651ee325bed323eb.exe
          1⤵
          • Executes dropped EXE
          PID:3976

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\8951f45222cbbffc1727d17ff7dd1a46321b1bc5f313f756651ee325bed323eb.exe

          Filesize

          759KB

          MD5

          66eb277fd9fbf5cb77c60ce927d44779

          SHA1

          4848667fef47431c1ee3ed72889d8fadb008264f

          SHA256

          8951f45222cbbffc1727d17ff7dd1a46321b1bc5f313f756651ee325bed323eb

          SHA512

          384c83c9981b9b125423aead064a756e39d79f2d4d167aa3539e833b859249af7d096cd446034ef0043c3fbf882cef8c203468c1059c547a11cafa7d2a26e259

        • C:\Users\Admin\Desktop\xFT1g_readme_.txt

          Filesize

          3KB

          MD5

          3c22312097342f5fdcfca2932838f888

          SHA1

          db608f8c6b493164bda75be3f604f2412fe82c8e

          SHA256

          9487c0c37573f5f36545ff9b8bd13db5a24a2a57d8eca3791ae337d1bf314281

          SHA512

          55bffb21cf228f98a711e3fdaeda4409b6560c0c776d2d8dc15b9d5cebf3ce46cfef8a592d66bbbffef5e49518687d0f6f7081c45ed7c23818d316fac2e20afd

        • C:\Users\Admin\Desktop\xFT1g_readme_.txt

          Filesize

          3KB

          MD5

          58bea815bd0511d453520c79b6269a39

          SHA1

          37f3692f8cbe4275fe9c059439613779fc77e4f4

          SHA256

          918bc4041d235c3dbed04ee5f8f31131fb5d80b0085d10fb8c51559525d5f496

          SHA512

          31227c04da42024b7ce7c0daa8837fc528fe4af8a9f6a1c260d9472468b5db82e44e2fe3d0b8d163c93f75a6975cfabba8d1b324f37396ee351887869f63fc24