Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15/05/2024, 17:29

General

  • Target

    2024-05-15_4f5244a9591477595bdeb8217120e018_avoslocker.exe

  • Size

    1.3MB

  • MD5

    4f5244a9591477595bdeb8217120e018

  • SHA1

    3940ef788fc5fc71cb709567c326f79887cc0860

  • SHA256

    b3af46812cf78d5db8220306c983798909a4fb52aba337f58664fe91122b3ea8

  • SHA512

    584c8f369609b83ccca1dc1fc87077c49a216310aada6e1eee9baec09feb5d24a4696ffbf7dc6e794da8b524492ab1e504764c75a12a69b8724232f849d545d1

  • SSDEEP

    24576:W2zEYytjjqNSlhvpfQiIhKPtehfQ7r9qySkbgedqaHsK+fM2jEaNZBqoeW7V6tGX:WPtjtQiIhUyQd1SkFdqksDM2jh3BqS7z

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-15_4f5244a9591477595bdeb8217120e018_avoslocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-15_4f5244a9591477595bdeb8217120e018_avoslocker.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2248
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    PID:2540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\System32\alg.exe

    Filesize

    644KB

    MD5

    a35c35eadcd0a72fabd94192a9712eb4

    SHA1

    5e474c189defd4bf2ca741f601549de8b2ab09e0

    SHA256

    3fd929df8df840f44030a1788ad2515b8d6e209ed738acd673c4764ef04b1648

    SHA512

    6c7d1fe19dfc6dbce046739aab9b1ec86798dcef273f9c0455308394d5883109cf4853b2d86a21f0778e09c8fc9f465cfb9d0d92d063d8a16ba936a62f7d7d7e

  • memory/2248-0-0x0000000000400000-0x0000000000554000-memory.dmp

    Filesize

    1.3MB

  • memory/2248-1-0x0000000000230000-0x0000000000297000-memory.dmp

    Filesize

    412KB

  • memory/2248-6-0x0000000000230000-0x0000000000297000-memory.dmp

    Filesize

    412KB

  • memory/2248-17-0x0000000000400000-0x0000000000554000-memory.dmp

    Filesize

    1.3MB

  • memory/2540-19-0x0000000100000000-0x00000001000A4000-memory.dmp

    Filesize

    656KB

  • memory/2540-20-0x0000000100000000-0x00000001000A4000-memory.dmp

    Filesize

    656KB