Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-04-2024 05:34
Static task
static1
Behavioral task
behavioral1
Sample
f75e92b4cf12745c63966bb50c82e4be_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f75e92b4cf12745c63966bb50c82e4be_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f75e92b4cf12745c63966bb50c82e4be_JaffaCakes118.exe
-
Size
921KB
-
MD5
f75e92b4cf12745c63966bb50c82e4be
-
SHA1
e58678781548262b653b34bbf3f55339d53f28cb
-
SHA256
a1b504b8e34200d8029f6d75491d517e460162cb9df438257ee4ed85f61c18bc
-
SHA512
2d66d1868e44956c00593d7d19d70b14475571dcd9b5eee9d15ac4fa3d473ce3a05c598c57ea31707b4deaa3469ed046b85f4e9c3f04430e652eda4d6a4f6038
-
SSDEEP
24576:SnkXEg1ZlhKG+WWZtCpDCE5Ie534SCeTpOl13lHlI:SkXEg1ZlIzZtCpGE5j5oSHOlxRlI
Malware Config
Extracted
C:\GET_YOUR_FILES_BACK.txt
http://avosjon4pfh3y7ew3jdwz6ofw7lljcxlbk7hcxxmnxlh5kvf2akcqjad.onion
http://avosqxh72b5ia23dl5fgwcpndkctuzqvh2iefk5imp3pi5gfhel5klad.onion
Signatures
-
Avoslocker Ransomware
Avoslocker is a relatively new ransomware, that was observed in late June and early July, 2021.
-
Renames multiple (160) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1440385283.png" reg.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 3236 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 3236 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
f75e92b4cf12745c63966bb50c82e4be_JaffaCakes118.exepowershell.exedescription pid process target process PID 2136 wrote to memory of 3236 2136 f75e92b4cf12745c63966bb50c82e4be_JaffaCakes118.exe powershell.exe PID 2136 wrote to memory of 3236 2136 f75e92b4cf12745c63966bb50c82e4be_JaffaCakes118.exe powershell.exe PID 2136 wrote to memory of 3236 2136 f75e92b4cf12745c63966bb50c82e4be_JaffaCakes118.exe powershell.exe PID 2136 wrote to memory of 3236 2136 f75e92b4cf12745c63966bb50c82e4be_JaffaCakes118.exe powershell.exe PID 3236 wrote to memory of 3368 3236 powershell.exe reg.exe PID 3236 wrote to memory of 3368 3236 powershell.exe reg.exe PID 3236 wrote to memory of 3368 3236 powershell.exe reg.exe PID 3236 wrote to memory of 3368 3236 powershell.exe reg.exe PID 3236 wrote to memory of 3416 3236 powershell.exe rundll32.exe PID 3236 wrote to memory of 3416 3236 powershell.exe rundll32.exe PID 3236 wrote to memory of 3416 3236 powershell.exe rundll32.exe PID 3236 wrote to memory of 3416 3236 powershell.exe rundll32.exe PID 3236 wrote to memory of 3416 3236 powershell.exe rundll32.exe PID 3236 wrote to memory of 3416 3236 powershell.exe rundll32.exe PID 3236 wrote to memory of 3416 3236 powershell.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f75e92b4cf12745c63966bb50c82e4be_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f75e92b4cf12745c63966bb50c82e4be_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$a = [System.IO.File]::ReadAllText(\"C:\GET_YOUR_FILES_BACK.txt\");Add-Type -AssemblyName System.Drawing;$filename = \"$env:temp\$(Get-Random).png\";$bmp = new-object System.Drawing.Bitmap 1920,1080;$font = new-object System.Drawing.Font Consolas,10;$brushBg = [System.Drawing.Brushes]::Black;$brushFg = [System.Drawing.Brushes]::White;$format = [System.Drawing.StringFormat]::GenericDefault;$format.Alignment = [System.Drawing.StringAlignment]::Center;$format.LineAlignment = [System.Drawing.StringAlignment]::Center;$graphics = [System.Drawing.Graphics]::FromImage($bmp);$graphics.FillRectangle($brushBg,0,0,$bmp.Width,$bmp.Height);$graphics.DrawString($a,$font,$brushFg,[System.Drawing.RectangleF]::FromLTRB(0, 0, 1920, 1080),$format);$graphics.Dispose();$bmp.Save($filename);reg add \"HKEY_CURRENT_USER\Control Panel\Desktop\" /v Wallpaper /t REG_SZ /d $filename /f;Start-Sleep 1;rundll32.exe user32.dll, UpdatePerUserSystemParameters, 0, $false;"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add "HKEY_CURRENT_USER\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\1440385283.png /f3⤵
- Sets desktop wallpaper using registry
PID:3368
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" user32.dll UpdatePerUserSystemParameters 0 False3⤵PID:3416
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59cd17876488bd2c2b81b965620b9aa14
SHA1f5305680ebd56c1eebc1797c6a7ce93117c3423c
SHA25608152eb79c4f4b16badb06fe231da164570b62999357c8da8659e6d024f11127
SHA5127eea1d69e706ef86c0d2343630bc3553b2d5418523d2e4aabcc66d1c0ea3754351ed4c0ab6c185eabbd313f5333d56182c0a9e873aa05b1c5e514e9a3dfceb8d
-
Filesize
45KB
MD5872f2818b8dd4aa2fe819ad63cc3d349
SHA1f95a28516f592d2191b8432744b727f69989b861
SHA2561134162a0e341473f75eac201100f066d39c2e10408161222b83ab8e8a418a98
SHA51249c2a6c15de1bf682a1a86e84bc36d2b12971be0b1b834e06c2cf34b94b0194d6e79f44c2e5d190794df5d22699aec86d59432e0ac2f5299ba11e8e85b08d9f9