Analysis

  • max time kernel
    133s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 00:35

General

  • Target

    2024-05-23_49d0d29f68cd7a860be1e78fd656b9c1_avoslocker.exe

  • Size

    9.1MB

  • MD5

    49d0d29f68cd7a860be1e78fd656b9c1

  • SHA1

    8dd581b620dff22c8bd1e847854325653e573bd6

  • SHA256

    bc3b4d4449ea7607c4c6a068f9590303a334e3566691d95407c500ff2727a1ec

  • SHA512

    c593acd19b4f65c5f49c09412116f321c73756680fe177f79b81e870b0a454976dc45308da819eca31dacc3d97d6292c1e0460166be40b93fbe25cf2cfbd7e1f

  • SSDEEP

    196608:rLno2R4+m8+VEiPGMoQolWCeLUyBgNTcazbdZOvf/:nnofHAQvxK4a3fOv

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-23_49d0d29f68cd7a860be1e78fd656b9c1_avoslocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-23_49d0d29f68cd7a860be1e78fd656b9c1_avoslocker.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:4200

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4200-1-0x00000000033F0000-0x00000000033F1000-memory.dmp

    Filesize

    4KB

  • memory/4200-0-0x00000000033E0000-0x00000000033E1000-memory.dmp

    Filesize

    4KB

  • memory/4200-12-0x00000000034B0000-0x00000000034B1000-memory.dmp

    Filesize

    4KB

  • memory/4200-14-0x00000000034C0000-0x00000000034C1000-memory.dmp

    Filesize

    4KB

  • memory/4200-15-0x00000000034D0000-0x00000000034D1000-memory.dmp

    Filesize

    4KB

  • memory/4200-13-0x0000000000B3E000-0x0000000000E9B000-memory.dmp

    Filesize

    3.4MB

  • memory/4200-11-0x00000000034A0000-0x00000000034A1000-memory.dmp

    Filesize

    4KB

  • memory/4200-10-0x0000000003490000-0x0000000003491000-memory.dmp

    Filesize

    4KB

  • memory/4200-9-0x0000000003480000-0x0000000003481000-memory.dmp

    Filesize

    4KB

  • memory/4200-8-0x0000000003470000-0x0000000003471000-memory.dmp

    Filesize

    4KB

  • memory/4200-7-0x0000000003460000-0x0000000003461000-memory.dmp

    Filesize

    4KB

  • memory/4200-6-0x0000000003450000-0x0000000003451000-memory.dmp

    Filesize

    4KB

  • memory/4200-5-0x0000000003440000-0x0000000003441000-memory.dmp

    Filesize

    4KB

  • memory/4200-4-0x0000000003420000-0x0000000003421000-memory.dmp

    Filesize

    4KB

  • memory/4200-3-0x0000000003410000-0x0000000003411000-memory.dmp

    Filesize

    4KB

  • memory/4200-2-0x0000000003400000-0x0000000003401000-memory.dmp

    Filesize

    4KB

  • memory/4200-21-0x0000000003700000-0x000000000380E000-memory.dmp

    Filesize

    1.1MB

  • memory/4200-22-0x0000000003700000-0x000000000380E000-memory.dmp

    Filesize

    1.1MB

  • memory/4200-17-0x0000000003700000-0x000000000380E000-memory.dmp

    Filesize

    1.1MB

  • memory/4200-23-0x0000000003700000-0x000000000380E000-memory.dmp

    Filesize

    1.1MB

  • memory/4200-24-0x0000000000B3E000-0x0000000000E9B000-memory.dmp

    Filesize

    3.4MB