Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 02:40

General

  • Target

    2024-05-22_ed3a87eafd5bc16bc86d46c5d0627b7b_avoslocker.exe

  • Size

    4.3MB

  • MD5

    ed3a87eafd5bc16bc86d46c5d0627b7b

  • SHA1

    64267d8958a84fa386ecd7c76776ea1426a0ae27

  • SHA256

    6e6b500282215f414c256b268d605d45129b183b3acfb3b386f6580979e5e388

  • SHA512

    40b9cef634df8e3819d517d915926a172da4809a587d3c5c974dfc66f89c01fe254eb20a4bc5e84d35ae800e02b8dce72c1d3eb8909c624cfdf210d4f9ac1adf

  • SSDEEP

    98304:fO/RG67kIN84klIci68xyDC2YmoieSoaSiHFnI6ts3/:i724kDi6s2YBieS96/

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 44 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-22_ed3a87eafd5bc16bc86d46c5d0627b7b_avoslocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-22_ed3a87eafd5bc16bc86d46c5d0627b7b_avoslocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2252
    • C:\Windows\temp\067C2DF94E71FE116908AD691D219674\2024-05-22_ed3a87eafd5bc16bc86d46c5d0627b7b_avoslocker.exe
      "C:\Windows\temp\067C2DF94E71FE116908AD691D219674\2024-05-22_ed3a87eafd5bc16bc86d46c5d0627b7b_avoslocker.exe" -initialNonSecureSetupPath="C:\Users\Admin\AppData\Local\Temp\2024-05-22_ed3a87eafd5bc16bc86d46c5d0627b7b_avoslocker.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • Writes to the Master Boot Record (MBR)
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Modifies system certificate store
      PID:2096

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Defense Evasion

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Discovery

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Kaspersky Lab Setup Files\KFA21.17.7.539.0.2.0\au_setup_9FF0EE23-17E4-11EF-9680-DA96D1126947\startup.exe
    Filesize

    4.3MB

    MD5

    17e399ee04b420ba28c8d252cb8f10e4

    SHA1

    ffc9cc3e03764d6ee335226ecc74a1a7333df667

    SHA256

    70ef2156702f2b2c93e2281087b5ba291e00046e8488cdfc234fea08163c3704

    SHA512

    9d61795a2d0289ccc1ee0325119825398d62bcbd6cec41eea25d698018bdaf7353aa547769c0664e999aa7080819c6eeabd80b330c34f760203c5034bfe75db7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    304B

    MD5

    a4ec0b0798f19d998ecbcf3b2781215b

    SHA1

    334196ab70b1b98f0214b847150d48d3b18a16b0

    SHA256

    d8219051bf6a0830b11eda4772bff75a9851e42f59c183057456bfd8534a7c18

    SHA512

    c50614c95b5313794353f4787733c7a334152cb37534da17698b538f2060a35a563029de11f5fcad19ce37c8b13847cdcc2479849a986f73883e5c6c41328316

  • C:\Users\Admin\AppData\Local\Temp\02EE0FF94E71FE116908AD691D219674\System.Windows.Interactivity.dll
    Filesize

    39KB

    MD5

    3ab57a33a6e3a1476695d5a6e856c06a

    SHA1

    dabb4ecffd0c422a8eebff5d4ec8116a6e90d7e7

    SHA256

    4aace8c8a330ae8429cd8cc1b6804076d3a9ffd633470f91fd36bdd25bb57876

    SHA512

    58dbfcf9199d72d370e2d98b8ef2713d74207a597c9494b0ecf5e4c7bf7cf60c5e85f4a92b2a1896dff63d9d5107f0d81d7dddbc7203e9e559ab7219eca0df92

  • C:\Users\Admin\AppData\Local\Temp\02EE0FF94E71FE116908AD691D219674\kl.setup.ui.visuals.dll
    Filesize

    417KB

    MD5

    5bcc51f3bb85949e37ffc08cf1501f70

    SHA1

    f2d6067c3084e5c0af33b6e4bb9837b3f05a8f83

    SHA256

    fdcbe09d8c6ee7681e88bbf7bbcc6c87f089d034e00df6a422c3482f4a99a2bd

    SHA512

    950d8bf52222c1ba6c5173b3a9385737b4b414a259d72adee921b524b790113f473e00b5961972b19ad5dd2349fc1ba5c7b3541086c5b93a11238992a0e3c8a5

  • C:\Users\Admin\AppData\Local\Temp\Tar3E3F.tmp
    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • \Users\Admin\AppData\Local\Temp\02EE0FF94E71FE116908AD691D219674\kl.setup.ui.core.dll
    Filesize

    89KB

    MD5

    78fb3f1e9f69beca863af1ff7713249c

    SHA1

    65e00f042db34b385d9bfd0100a3b13efd79df5e

    SHA256

    323aa8d8707a030bf245d6031b7fb439c929a3a24c5621a03276114691e45aac

    SHA512

    79bcfa36dfb3b1a6e04d06a5d85fce6574831d5684ae55c9e08784ee6a585bde5c649438103d40edd85da3bb8fd1d27b00be16fd421d32502da3587468ee8ced

  • \Users\Admin\AppData\Local\Temp\02EE0FF94E71FE116908AD691D219674\kl.setup.ui.dll
    Filesize

    279KB

    MD5

    bb9df6ed16bad5bbcde9b106e11dff6f

    SHA1

    5a18c06282442a241e42ea45eb636cc77bf7d95c

    SHA256

    dc5f2821548e5a660fc920224846994da0169972f18a15e04fc9943a6a08f734

    SHA512

    12d3c0ec2cc0224614cd8dcc81bb0f5610a0b836420628722d3409775f1c186b9d7cadb9a61bf5ce5f5ae1c99fa408ad14900f7f8b83c0b5073180786f9123a6

  • \Users\Admin\AppData\Local\Temp\02EE0FF94E71FE116908AD691D219674\kl.setup.ui.interoplayer.dll
    Filesize

    56KB

    MD5

    a54a9d1185edd71b120010d131f0dbea

    SHA1

    e24ebb90da9840cb2b813bac4409c9525258d864

    SHA256

    a7d59379fdfa59c21b114b087b16028480f976efa12e3a197fff3729f28f3bb3

    SHA512

    c16e90afa3c9d49c6fb8af03e027e927c6ae582f28ffd6cbcb79178a47346327bef6ee8791cc0c04643ca7204c964c19c270f6c8609f1225bdcaf7d5f3c94c49

  • \Users\Admin\AppData\Local\Temp\02EE0FF94E71FE116908AD691D219674\kl.ui.framework.dll
    Filesize

    235KB

    MD5

    aeb7ba2ce5574025a985313bdde99cfb

    SHA1

    7e7d4d90a11c317c5d3b5065d47ef4209296cdaa

    SHA256

    92d7b5ad2e92e72804223e71cde8350ba7f0561e5e1b8c0002ce88e3e88f6ef0

    SHA512

    bd0aa5b5ac94076d6d6607cf704bcd89cabf43d3f99042fee8b653a0674c315ac9e464f0aef091998152f6b107a47034b541021efaf759bf250f6f99a91ba572

  • \Users\Admin\AppData\Local\Temp\02EE0FF94E71FE116908AD691D219674\kl.ui.framework.localization.dll
    Filesize

    281KB

    MD5

    ccf2531b77412b4eb5410888bd3eeb42

    SHA1

    ccc53ff2ac5b21d2a026b9f3431a016aee08dcb6

    SHA256

    170a04a3141b1c4f2606c3ba78d687972db6319d85d7a45f59958cc9f1fd05bd

    SHA512

    6eefd54ed14076cbd391e95817ce53c4bf69bae7d3c6f75f682d8e26f236cb2e4b9153c54fe358e1f833e9661cdc010686a2a5136fa70d77ca7f81cd59e32909

  • \Users\Admin\AppData\Local\Temp\02EE0FF94E71FE116908AD691D219674\kl.ui.framework.uikit.b2c.dll
    Filesize

    543KB

    MD5

    fb389c9c3c063163f5609608405f66bc

    SHA1

    0d2d249335b82941aaa7aeb58947c12cadf04ff8

    SHA256

    7e97138fe069a260a05bad7beddc31fc54d0909f36728ab0efa761e7580393df

    SHA512

    c169b1e6fecd432517f58bac541820c4fde5fefd847b9dd4544d290f95334b8fc392b26cd02eebeb30aaddb87885bd35b1f0c46644b1e5b9e9c84115afebf0f7

  • \Users\Admin\AppData\Local\Temp\02EE0FF94E71FE116908AD691D219674\kl.ui.framework.uikit.dll
    Filesize

    2.5MB

    MD5

    7076c5eb43353580a88554a458c393dc

    SHA1

    74d9ec58d4ef5d0a7a69fe6500b47c6873ed87ba

    SHA256

    294055db0edebad0b62f5690d65c401ff3c859bb2ce913c7840142ea344f0f24

    SHA512

    81c88f67e55c415a5fe48c07d020069cd494c7eaafb8c79475093121121d7360c9a72e79f9f64c6700f4a90a923ae876064d0a942c2cda3a6914c1b07a218515

  • \Users\Admin\AppData\Local\Temp\02EE0FF94E71FE116908AD691D219674\setup.dll
    Filesize

    5.6MB

    MD5

    986033838280c8d36c4fcc14b03caa35

    SHA1

    ac082f683dbbf4537dccee380b802055b2cf60df

    SHA256

    42abfb0fd3d1fba8832f5eb2aa0e0d42a10b60f4a033c1b3838668287a4e88d6

    SHA512

    4245f331953fd6661d75349e229e012fdce8fdf85de5f3666468f9b6198d678292ecd1970a6eb0101c02c3609d2116d7a609b9341509478de1b4e03c9614d65e

  • \Users\Admin\AppData\Local\Temp\02EE0FF94E71FE116908AD691D219674\sharpvectorconverterswpf.dll
    Filesize

    137KB

    MD5

    ca5e6167b66c384f62e56fe0e1757af3

    SHA1

    4d8912deab579d0ad3bfa7477f7377d03260ec1f

    SHA256

    a9edc78bc8dd9e6ab098c96d2f26949bf8cc7c1f1071c5d96154022dac685979

    SHA512

    53d2828ea80ba1c9726240859c42deddf3b384bfdc173763804d5c0e59bc531de519720c8f396cba3851768be14ebed5f8f6ed501d2a99055f2abab9c920ce5a

  • \Users\Admin\AppData\Local\Temp\02EE0FF94E71FE116908AD691D219674\sharpvectorcore.dll
    Filesize

    201KB

    MD5

    f6004bd10ff1bced912d389a48138323

    SHA1

    349d4f7bb69dec14ce5051c1ce4d7aaf33ce9ab8

    SHA256

    fa2c2216181125daaf69ce4c7e2addc9df98e09845a27292b9775ff8d568ac39

    SHA512

    550af5c8d54f4987a7c05347c9fa21a6cac5817ed410c5f9358bed6d13648c0c55be2426ea3b221f82b635e91f2a2c505f07703ae93392754c870853073536d5

  • \Users\Admin\AppData\Local\Temp\02EE0FF94E71FE116908AD691D219674\sharpvectorcss.dll
    Filesize

    109KB

    MD5

    25e40483458b8083eb12d38b6cead136

    SHA1

    9158642854dcdc9b2610272e181d98526b3547cc

    SHA256

    1a87d710b34b187f75e9213c95ab5eb129da63906f122035e7badf7044c929c9

    SHA512

    381ba47f815cfc4fe665913a49f8e53121dcad53c8e63ffc3d61663a2b5db0fc3fb2e3e8784fe5a0fd058ccb0687317c11e01debf4c596795f7cae5fd45dcadb

  • \Users\Admin\AppData\Local\Temp\02EE0FF94E71FE116908AD691D219674\sharpvectordom.dll
    Filesize

    55KB

    MD5

    b97a47906b78413d18249eaa15c0933b

    SHA1

    ccf1951838e20c52cdc440cea34f88101310dbb3

    SHA256

    5fd8cfbe80ec610463ab092b74e2c22b2651f30dd0660849d09210e70eca7254

    SHA512

    b490641ca358c270e77e587c5ecff4ad60848384348603d576212e4da133d30087aa32ed11037d19de8f3f6777711255f5a6a9a66ddfa0abb87d893d72619af5

  • \Users\Admin\AppData\Local\Temp\02EE0FF94E71FE116908AD691D219674\sharpvectormodel.dll
    Filesize

    997KB

    MD5

    ff09404438a1aaf5bafa792a504e7631

    SHA1

    7e78ad564aba274bf70c5320e39ae5061b30572a

    SHA256

    ccf8359d7862330ebb1dd0a5f50b9e12e43b1763ef64cde5417960774d1dcf11

    SHA512

    8b90210aa69b69b9e4e06a721a444ca9e50bcb87648fffdd2f47f2056ad52c55a2228547c45757a804b3b76ced8bf8899918f5c4a23f2139061bdff1dcf23db5

  • \Users\Admin\AppData\Local\Temp\02EE0FF94E71FE116908AD691D219674\sharpvectorrenderingwpf.dll
    Filesize

    203KB

    MD5

    619044935bd3151b6d1fef1e06ce5323

    SHA1

    f5d5e2b4171465ef022ed85ea7ff1e70c7b2a581

    SHA256

    5b6dc4ff32972e022a3a457d319ffc756c915b8f9be4fa62a550f2e361aca5f2

    SHA512

    d5f4cc32d6ccecd4accdb78913badc5190adea1df1e173d5b47ef2c522cadf4d2f198deb25440aa1360c03ba90fe734f3f8a3b63b38e7b7c54b8d3ecaad06cd4

  • \Users\Admin\AppData\Local\Temp\02EE0FF94E71FE116908AD691D219674\sharpvectorruntimewpf.dll
    Filesize

    69KB

    MD5

    cef0c0a808a94ef99fc4dc3472691a21

    SHA1

    637ea1d4def4e840d73af915d0118db2c8c9f2bc

    SHA256

    186fb849e9284fda5ed5ea84b1bb7a73b4321afa063df2fa4812b7f0dd857761

    SHA512

    0f764d85f76fe2fdcf094120f379e0841b74f710b6857722687334bd7a01329d79ab653e825c323110c9e67999429c70efe2c213b7a6a77d1d939f1829f5ad67

  • \Windows\Temp\067C2DF94E71FE116908AD691D219674\2024-05-22_ed3a87eafd5bc16bc86d46c5d0627b7b_avoslocker.exe
    Filesize

    4.3MB

    MD5

    ed3a87eafd5bc16bc86d46c5d0627b7b

    SHA1

    64267d8958a84fa386ecd7c76776ea1426a0ae27

    SHA256

    6e6b500282215f414c256b268d605d45129b183b3acfb3b386f6580979e5e388

    SHA512

    40b9cef634df8e3819d517d915926a172da4809a587d3c5c974dfc66f89c01fe254eb20a4bc5e84d35ae800e02b8dce72c1d3eb8909c624cfdf210d4f9ac1adf

  • memory/2096-104-0x0000000007990000-0x0000000007A18000-memory.dmp
    Filesize

    544KB

  • memory/2096-153-0x0000000006100000-0x0000000006112000-memory.dmp
    Filesize

    72KB

  • memory/2096-89-0x0000000008270000-0x00000000084F8000-memory.dmp
    Filesize

    2.5MB

  • memory/2096-93-0x0000000007130000-0x0000000007198000-memory.dmp
    Filesize

    416KB

  • memory/2096-85-0x0000000006520000-0x0000000006566000-memory.dmp
    Filesize

    280KB

  • memory/2096-468-0x00000000736B0000-0x0000000073D9E000-memory.dmp
    Filesize

    6.9MB

  • memory/2096-109-0x0000000007990000-0x0000000007A18000-memory.dmp
    Filesize

    544KB

  • memory/2096-81-0x0000000002D10000-0x0000000002D26000-memory.dmp
    Filesize

    88KB

  • memory/2096-121-0x0000000003780000-0x0000000003790000-memory.dmp
    Filesize

    64KB

  • memory/2096-116-0x0000000003780000-0x0000000003790000-memory.dmp
    Filesize

    64KB

  • memory/2096-128-0x0000000003D40000-0x0000000003D74000-memory.dmp
    Filesize

    208KB

  • memory/2096-133-0x0000000003970000-0x0000000003992000-memory.dmp
    Filesize

    136KB

  • memory/2096-77-0x0000000003810000-0x000000000384C000-memory.dmp
    Filesize

    240KB

  • memory/2096-53-0x0000000003210000-0x0000000003256000-memory.dmp
    Filesize

    280KB

  • memory/2096-149-0x0000000005F30000-0x0000000005F3E000-memory.dmp
    Filesize

    56KB

  • memory/2096-48-0x00000000736B0000-0x0000000073D9E000-memory.dmp
    Filesize

    6.9MB

  • memory/2096-145-0x0000000005ED0000-0x0000000005EEC000-memory.dmp
    Filesize

    112KB

  • memory/2096-49-0x00000000736B0000-0x0000000073D9E000-memory.dmp
    Filesize

    6.9MB

  • memory/2096-45-0x0000000000A80000-0x0000000000A8E000-memory.dmp
    Filesize

    56KB

  • memory/2096-98-0x0000000007130000-0x0000000007198000-memory.dmp
    Filesize

    416KB

  • memory/2096-141-0x0000000008B70000-0x0000000008C6A000-memory.dmp
    Filesize

    1000KB

  • memory/2096-137-0x0000000006990000-0x00000000069C2000-memory.dmp
    Filesize

    200KB

  • memory/2096-41-0x00000000736BE000-0x00000000736BF000-memory.dmp
    Filesize

    4KB

  • memory/2096-158-0x00000000736B0000-0x0000000073D9E000-memory.dmp
    Filesize

    6.9MB

  • memory/2096-159-0x00000000736B0000-0x0000000073D9E000-memory.dmp
    Filesize

    6.9MB

  • memory/2096-129-0x00000000037E0000-0x00000000037EA000-memory.dmp
    Filesize

    40KB

  • memory/2096-8-0x0000000077A90000-0x0000000077AA0000-memory.dmp
    Filesize

    64KB

  • memory/2096-124-0x00000000037E0000-0x00000000037EA000-memory.dmp
    Filesize

    40KB

  • memory/2096-9-0x0000000077A90000-0x0000000077AA0000-memory.dmp
    Filesize

    64KB

  • memory/2096-10-0x0000000077A90000-0x0000000077AA0000-memory.dmp
    Filesize

    64KB

  • memory/2096-467-0x00000000037E0000-0x00000000037EA000-memory.dmp
    Filesize

    40KB

  • memory/2096-466-0x00000000736B0000-0x0000000073D9E000-memory.dmp
    Filesize

    6.9MB

  • memory/2096-464-0x00000000736BE000-0x00000000736BF000-memory.dmp
    Filesize

    4KB

  • memory/2096-465-0x00000000736B0000-0x0000000073D9E000-memory.dmp
    Filesize

    6.9MB

  • memory/2252-1-0x0000000077A70000-0x0000000077A80000-memory.dmp
    Filesize

    64KB

  • memory/2252-0-0x0000000077A70000-0x0000000077A80000-memory.dmp
    Filesize

    64KB

  • memory/2252-2-0x0000000077A70000-0x0000000077A80000-memory.dmp
    Filesize

    64KB