Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    18-04-2024 05:34

General

  • Target

    f75e92b4cf12745c63966bb50c82e4be_JaffaCakes118.exe

  • Size

    921KB

  • MD5

    f75e92b4cf12745c63966bb50c82e4be

  • SHA1

    e58678781548262b653b34bbf3f55339d53f28cb

  • SHA256

    a1b504b8e34200d8029f6d75491d517e460162cb9df438257ee4ed85f61c18bc

  • SHA512

    2d66d1868e44956c00593d7d19d70b14475571dcd9b5eee9d15ac4fa3d473ce3a05c598c57ea31707b4deaa3469ed046b85f4e9c3f04430e652eda4d6a4f6038

  • SSDEEP

    24576:SnkXEg1ZlhKG+WWZtCpDCE5Ie534SCeTpOl13lHlI:SkXEg1ZlIzZtCpGE5j5oSHOlxRlI

Score
10/10

Malware Config

Extracted

Path

C:\GET_YOUR_FILES_BACK.txt

Ransom Note
AvosLocker Attention! Your systems have been encrypted, and your confidential documents were downloaded. In order to restore your data, you must pay for the decryption key & application. You may do so by visiting us at http://avosjon4pfh3y7ew3jdwz6ofw7lljcxlbk7hcxxmnxlh5kvf2akcqjad.onion. This is an onion address that you may access using Tor Browser which you may download at https://www.torproject.org/download/ Details such as pricing, how long before the price increases and such will be available to you once you enter your ID presented to you below in this note in our website. Contact us soon, because those who don't have their data leaked in our press release blog and the price they'll have to pay will go up significantly. The corporations whom don't pay or fail to respond in a swift manner have their data leaked in our blog, accessible at http://avosqxh72b5ia23dl5fgwcpndkctuzqvh2iefk5imp3pi5gfhel5klad.onion Additional notes from attackers responsible: Hello, All your data in the company is encrypted and your important company data is backed up. I do not need money, I receive payments from many companies every day and I deal with the encryption of many companies every day. More important than money is time for me. For this reason, I have time to inflate the number and bargain like other friends who do this business. The offer I have made for your company is very reasonable and not a big deal for you. If you do not pay, the data of the company that we have backed up after 7 days will be shared publicly on the internet and you will not be able to recover any of your encrypted data. Your ID: 8c7a9b681dfa1b2b87ea459caddf2adf9413dc76664fb74063fb264116897023
URLs

http://avosjon4pfh3y7ew3jdwz6ofw7lljcxlbk7hcxxmnxlh5kvf2akcqjad.onion

http://avosqxh72b5ia23dl5fgwcpndkctuzqvh2iefk5imp3pi5gfhel5klad.onion

Signatures

  • Avoslocker Ransomware

    Avoslocker is a relatively new ransomware, that was observed in late June and early July, 2021.

  • Renames multiple (160) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f75e92b4cf12745c63966bb50c82e4be_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f75e92b4cf12745c63966bb50c82e4be_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2136
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command "$a = [System.IO.File]::ReadAllText(\"C:\GET_YOUR_FILES_BACK.txt\");Add-Type -AssemblyName System.Drawing;$filename = \"$env:temp\$(Get-Random).png\";$bmp = new-object System.Drawing.Bitmap 1920,1080;$font = new-object System.Drawing.Font Consolas,10;$brushBg = [System.Drawing.Brushes]::Black;$brushFg = [System.Drawing.Brushes]::White;$format = [System.Drawing.StringFormat]::GenericDefault;$format.Alignment = [System.Drawing.StringAlignment]::Center;$format.LineAlignment = [System.Drawing.StringAlignment]::Center;$graphics = [System.Drawing.Graphics]::FromImage($bmp);$graphics.FillRectangle($brushBg,0,0,$bmp.Width,$bmp.Height);$graphics.DrawString($a,$font,$brushFg,[System.Drawing.RectangleF]::FromLTRB(0, 0, 1920, 1080),$format);$graphics.Dispose();$bmp.Save($filename);reg add \"HKEY_CURRENT_USER\Control Panel\Desktop\" /v Wallpaper /t REG_SZ /d $filename /f;Start-Sleep 1;rundll32.exe user32.dll, UpdatePerUserSystemParameters, 0, $false;"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3236
      • C:\Windows\SysWOW64\reg.exe
        "C:\Windows\system32\reg.exe" add "HKEY_CURRENT_USER\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\1440385283.png /f
        3⤵
        • Sets desktop wallpaper using registry
        PID:3368
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\system32\rundll32.exe" user32.dll UpdatePerUserSystemParameters 0 False
        3⤵
          PID:3416

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\GET_YOUR_FILES_BACK.txt

      Filesize

      1KB

      MD5

      9cd17876488bd2c2b81b965620b9aa14

      SHA1

      f5305680ebd56c1eebc1797c6a7ce93117c3423c

      SHA256

      08152eb79c4f4b16badb06fe231da164570b62999357c8da8659e6d024f11127

      SHA512

      7eea1d69e706ef86c0d2343630bc3553b2d5418523d2e4aabcc66d1c0ea3754351ed4c0ab6c185eabbd313f5333d56182c0a9e873aa05b1c5e514e9a3dfceb8d

    • C:\Users\Admin\AppData\Local\Temp\1440385283.png

      Filesize

      45KB

      MD5

      872f2818b8dd4aa2fe819ad63cc3d349

      SHA1

      f95a28516f592d2191b8432744b727f69989b861

      SHA256

      1134162a0e341473f75eac201100f066d39c2e10408161222b83ab8e8a418a98

      SHA512

      49c2a6c15de1bf682a1a86e84bc36d2b12971be0b1b834e06c2cf34b94b0194d6e79f44c2e5d190794df5d22699aec86d59432e0ac2f5299ba11e8e85b08d9f9

    • memory/3236-400-0x0000000074460000-0x0000000074A0B000-memory.dmp

      Filesize

      5.7MB

    • memory/3236-401-0x0000000074460000-0x0000000074A0B000-memory.dmp

      Filesize

      5.7MB

    • memory/3236-402-0x0000000002870000-0x00000000028B0000-memory.dmp

      Filesize

      256KB

    • memory/3236-405-0x0000000074460000-0x0000000074A0B000-memory.dmp

      Filesize

      5.7MB