Analysis
-
max time kernel
133s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 00:35
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-23_49d0d29f68cd7a860be1e78fd656b9c1_avoslocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-23_49d0d29f68cd7a860be1e78fd656b9c1_avoslocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-23_49d0d29f68cd7a860be1e78fd656b9c1_avoslocker.exe
-
Size
9.1MB
-
MD5
49d0d29f68cd7a860be1e78fd656b9c1
-
SHA1
8dd581b620dff22c8bd1e847854325653e573bd6
-
SHA256
bc3b4d4449ea7607c4c6a068f9590303a334e3566691d95407c500ff2727a1ec
-
SHA512
c593acd19b4f65c5f49c09412116f321c73756680fe177f79b81e870b0a454976dc45308da819eca31dacc3d97d6292c1e0460166be40b93fbe25cf2cfbd7e1f
-
SSDEEP
196608:rLno2R4+m8+VEiPGMoQolWCeLUyBgNTcazbdZOvf/:nnofHAQvxK4a3fOv
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
2024-05-23_49d0d29f68cd7a860be1e78fd656b9c1_avoslocker.exepid process 4200 2024-05-23_49d0d29f68cd7a860be1e78fd656b9c1_avoslocker.exe 4200 2024-05-23_49d0d29f68cd7a860be1e78fd656b9c1_avoslocker.exe 4200 2024-05-23_49d0d29f68cd7a860be1e78fd656b9c1_avoslocker.exe 4200 2024-05-23_49d0d29f68cd7a860be1e78fd656b9c1_avoslocker.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
Processes:
2024-05-23_49d0d29f68cd7a860be1e78fd656b9c1_avoslocker.exepid process 4200 2024-05-23_49d0d29f68cd7a860be1e78fd656b9c1_avoslocker.exe 4200 2024-05-23_49d0d29f68cd7a860be1e78fd656b9c1_avoslocker.exe 4200 2024-05-23_49d0d29f68cd7a860be1e78fd656b9c1_avoslocker.exe 4200 2024-05-23_49d0d29f68cd7a860be1e78fd656b9c1_avoslocker.exe 4200 2024-05-23_49d0d29f68cd7a860be1e78fd656b9c1_avoslocker.exe 4200 2024-05-23_49d0d29f68cd7a860be1e78fd656b9c1_avoslocker.exe 4200 2024-05-23_49d0d29f68cd7a860be1e78fd656b9c1_avoslocker.exe 4200 2024-05-23_49d0d29f68cd7a860be1e78fd656b9c1_avoslocker.exe 4200 2024-05-23_49d0d29f68cd7a860be1e78fd656b9c1_avoslocker.exe 4200 2024-05-23_49d0d29f68cd7a860be1e78fd656b9c1_avoslocker.exe 4200 2024-05-23_49d0d29f68cd7a860be1e78fd656b9c1_avoslocker.exe 4200 2024-05-23_49d0d29f68cd7a860be1e78fd656b9c1_avoslocker.exe 4200 2024-05-23_49d0d29f68cd7a860be1e78fd656b9c1_avoslocker.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4200-1-0x00000000033F0000-0x00000000033F1000-memory.dmpFilesize
4KB
-
memory/4200-0-0x00000000033E0000-0x00000000033E1000-memory.dmpFilesize
4KB
-
memory/4200-12-0x00000000034B0000-0x00000000034B1000-memory.dmpFilesize
4KB
-
memory/4200-14-0x00000000034C0000-0x00000000034C1000-memory.dmpFilesize
4KB
-
memory/4200-15-0x00000000034D0000-0x00000000034D1000-memory.dmpFilesize
4KB
-
memory/4200-13-0x0000000000B3E000-0x0000000000E9B000-memory.dmpFilesize
3.4MB
-
memory/4200-11-0x00000000034A0000-0x00000000034A1000-memory.dmpFilesize
4KB
-
memory/4200-10-0x0000000003490000-0x0000000003491000-memory.dmpFilesize
4KB
-
memory/4200-9-0x0000000003480000-0x0000000003481000-memory.dmpFilesize
4KB
-
memory/4200-8-0x0000000003470000-0x0000000003471000-memory.dmpFilesize
4KB
-
memory/4200-7-0x0000000003460000-0x0000000003461000-memory.dmpFilesize
4KB
-
memory/4200-6-0x0000000003450000-0x0000000003451000-memory.dmpFilesize
4KB
-
memory/4200-5-0x0000000003440000-0x0000000003441000-memory.dmpFilesize
4KB
-
memory/4200-4-0x0000000003420000-0x0000000003421000-memory.dmpFilesize
4KB
-
memory/4200-3-0x0000000003410000-0x0000000003411000-memory.dmpFilesize
4KB
-
memory/4200-2-0x0000000003400000-0x0000000003401000-memory.dmpFilesize
4KB
-
memory/4200-21-0x0000000003700000-0x000000000380E000-memory.dmpFilesize
1.1MB
-
memory/4200-22-0x0000000003700000-0x000000000380E000-memory.dmpFilesize
1.1MB
-
memory/4200-17-0x0000000003700000-0x000000000380E000-memory.dmpFilesize
1.1MB
-
memory/4200-23-0x0000000003700000-0x000000000380E000-memory.dmpFilesize
1.1MB
-
memory/4200-24-0x0000000000B3E000-0x0000000000E9B000-memory.dmpFilesize
3.4MB