Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-04-2024 05:34

General

  • Target

    f75e92b4cf12745c63966bb50c82e4be_JaffaCakes118.exe

  • Size

    921KB

  • MD5

    f75e92b4cf12745c63966bb50c82e4be

  • SHA1

    e58678781548262b653b34bbf3f55339d53f28cb

  • SHA256

    a1b504b8e34200d8029f6d75491d517e460162cb9df438257ee4ed85f61c18bc

  • SHA512

    2d66d1868e44956c00593d7d19d70b14475571dcd9b5eee9d15ac4fa3d473ce3a05c598c57ea31707b4deaa3469ed046b85f4e9c3f04430e652eda4d6a4f6038

  • SSDEEP

    24576:SnkXEg1ZlhKG+WWZtCpDCE5Ie534SCeTpOl13lHlI:SkXEg1ZlIzZtCpGE5j5oSHOlxRlI

Score
10/10

Malware Config

Extracted

Path

C:\GET_YOUR_FILES_BACK.txt

Ransom Note
AvosLocker Attention! Your systems have been encrypted, and your confidential documents were downloaded. In order to restore your data, you must pay for the decryption key & application. You may do so by visiting us at http://avosjon4pfh3y7ew3jdwz6ofw7lljcxlbk7hcxxmnxlh5kvf2akcqjad.onion. This is an onion address that you may access using Tor Browser which you may download at https://www.torproject.org/download/ Details such as pricing, how long before the price increases and such will be available to you once you enter your ID presented to you below in this note in our website. Contact us soon, because those who don't have their data leaked in our press release blog and the price they'll have to pay will go up significantly. The corporations whom don't pay or fail to respond in a swift manner have their data leaked in our blog, accessible at http://avosqxh72b5ia23dl5fgwcpndkctuzqvh2iefk5imp3pi5gfhel5klad.onion Additional notes from attackers responsible: Hello, All your data in the company is encrypted and your important company data is backed up. I do not need money, I receive payments from many companies every day and I deal with the encryption of many companies every day. More important than money is time for me. For this reason, I have time to inflate the number and bargain like other friends who do this business. The offer I have made for your company is very reasonable and not a big deal for you. If you do not pay, the data of the company that we have backed up after 7 days will be shared publicly on the internet and you will not be able to recover any of your encrypted data. Your ID: 8c7a9b681dfa1b2b87ea459caddf2adf9413dc76664fb74063fb264116897023
URLs

http://avosjon4pfh3y7ew3jdwz6ofw7lljcxlbk7hcxxmnxlh5kvf2akcqjad.onion

http://avosqxh72b5ia23dl5fgwcpndkctuzqvh2iefk5imp3pi5gfhel5klad.onion

Signatures

  • Avoslocker Ransomware

    Avoslocker is a relatively new ransomware, that was observed in late June and early July, 2021.

  • Renames multiple (155) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f75e92b4cf12745c63966bb50c82e4be_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f75e92b4cf12745c63966bb50c82e4be_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3028
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command "$a = [System.IO.File]::ReadAllText(\"C:\GET_YOUR_FILES_BACK.txt\");Add-Type -AssemblyName System.Drawing;$filename = \"$env:temp\$(Get-Random).png\";$bmp = new-object System.Drawing.Bitmap 1920,1080;$font = new-object System.Drawing.Font Consolas,10;$brushBg = [System.Drawing.Brushes]::Black;$brushFg = [System.Drawing.Brushes]::White;$format = [System.Drawing.StringFormat]::GenericDefault;$format.Alignment = [System.Drawing.StringAlignment]::Center;$format.LineAlignment = [System.Drawing.StringAlignment]::Center;$graphics = [System.Drawing.Graphics]::FromImage($bmp);$graphics.FillRectangle($brushBg,0,0,$bmp.Width,$bmp.Height);$graphics.DrawString($a,$font,$brushFg,[System.Drawing.RectangleF]::FromLTRB(0, 0, 1920, 1080),$format);$graphics.Dispose();$bmp.Save($filename);reg add \"HKEY_CURRENT_USER\Control Panel\Desktop\" /v Wallpaper /t REG_SZ /d $filename /f;Start-Sleep 1;rundll32.exe user32.dll, UpdatePerUserSystemParameters, 0, $false;"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4232
      • C:\Windows\SysWOW64\reg.exe
        "C:\Windows\system32\reg.exe" add "HKEY_CURRENT_USER\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\1539987827.png /f
        3⤵
        • Sets desktop wallpaper using registry
        PID:5188
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\system32\rundll32.exe" user32.dll UpdatePerUserSystemParameters 0 False
        3⤵
          PID:5272

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\GET_YOUR_FILES_BACK.txt

      Filesize

      1KB

      MD5

      9cd17876488bd2c2b81b965620b9aa14

      SHA1

      f5305680ebd56c1eebc1797c6a7ce93117c3423c

      SHA256

      08152eb79c4f4b16badb06fe231da164570b62999357c8da8659e6d024f11127

      SHA512

      7eea1d69e706ef86c0d2343630bc3553b2d5418523d2e4aabcc66d1c0ea3754351ed4c0ab6c185eabbd313f5333d56182c0a9e873aa05b1c5e514e9a3dfceb8d

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_cqj4xyne.pmc.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/4232-435-0x0000000006000000-0x0000000006066000-memory.dmp

      Filesize

      408KB

    • memory/4232-426-0x00000000030A0000-0x00000000030D6000-memory.dmp

      Filesize

      216KB

    • memory/4232-429-0x0000000003090000-0x00000000030A0000-memory.dmp

      Filesize

      64KB

    • memory/4232-430-0x0000000005820000-0x0000000005E48000-memory.dmp

      Filesize

      6.2MB

    • memory/4232-431-0x0000000005670000-0x0000000005692000-memory.dmp

      Filesize

      136KB

    • memory/4232-432-0x0000000005720000-0x0000000005786000-memory.dmp

      Filesize

      408KB

    • memory/4232-427-0x0000000074C90000-0x0000000075440000-memory.dmp

      Filesize

      7.7MB

    • memory/4232-428-0x0000000003090000-0x00000000030A0000-memory.dmp

      Filesize

      64KB

    • memory/4232-443-0x0000000006280000-0x00000000065D4000-memory.dmp

      Filesize

      3.3MB

    • memory/4232-444-0x0000000006660000-0x000000000667E000-memory.dmp

      Filesize

      120KB

    • memory/4232-445-0x0000000006710000-0x000000000675C000-memory.dmp

      Filesize

      304KB

    • memory/4232-447-0x0000000003090000-0x00000000030A0000-memory.dmp

      Filesize

      64KB

    • memory/4232-448-0x0000000007CE0000-0x000000000835A000-memory.dmp

      Filesize

      6.5MB

    • memory/4232-449-0x0000000006BA0000-0x0000000006BBA000-memory.dmp

      Filesize

      104KB

    • memory/4232-450-0x0000000007AD0000-0x0000000007B62000-memory.dmp

      Filesize

      584KB

    • memory/4232-454-0x0000000074C90000-0x0000000075440000-memory.dmp

      Filesize

      7.7MB