Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    129s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/05/2024, 17:29

General

  • Target

    2024-05-15_4f5244a9591477595bdeb8217120e018_avoslocker.exe

  • Size

    1.3MB

  • MD5

    4f5244a9591477595bdeb8217120e018

  • SHA1

    3940ef788fc5fc71cb709567c326f79887cc0860

  • SHA256

    b3af46812cf78d5db8220306c983798909a4fb52aba337f58664fe91122b3ea8

  • SHA512

    584c8f369609b83ccca1dc1fc87077c49a216310aada6e1eee9baec09feb5d24a4696ffbf7dc6e794da8b524492ab1e504764c75a12a69b8724232f849d545d1

  • SSDEEP

    24576:W2zEYytjjqNSlhvpfQiIhKPtehfQ7r9qySkbgedqaHsK+fM2jEaNZBqoeW7V6tGX:WPtjtQiIhUyQd1SkFdqksDM2jh3BqS7z

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-15_4f5244a9591477595bdeb8217120e018_avoslocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-15_4f5244a9591477595bdeb8217120e018_avoslocker.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    PID:4872
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    PID:4632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\System32\alg.exe

    Filesize

    661KB

    MD5

    011f2ee26cb2867bd910fcc598729861

    SHA1

    a907d2a52de6562070b80aa81b49861fe9f4e0e4

    SHA256

    f6afa2acdd84d85f596d64d4a9f079e980792164e3f4da20013006cb569aaa53

    SHA512

    dee759d6cce9c2648503505b19a66965528a07a6be4c3a3e7d292f1b237272df50960c5ff04f61d9d257674db78eca0c7f6d3e00e096c3977fabdf8d7fd42e85

  • memory/4632-17-0x0000000140000000-0x00000001400AA000-memory.dmp

    Filesize

    680KB

  • memory/4632-20-0x0000000140000000-0x00000001400AA000-memory.dmp

    Filesize

    680KB

  • memory/4872-5-0x0000000000400000-0x0000000000554000-memory.dmp

    Filesize

    1.3MB

  • memory/4872-0-0x0000000002310000-0x0000000002377000-memory.dmp

    Filesize

    412KB

  • memory/4872-6-0x0000000002310000-0x0000000002377000-memory.dmp

    Filesize

    412KB

  • memory/4872-8-0x0000000002310000-0x0000000002377000-memory.dmp

    Filesize

    412KB

  • memory/4872-19-0x0000000000400000-0x0000000000554000-memory.dmp

    Filesize

    1.3MB