Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25/05/2024, 21:08

General

  • Target

    2024-05-25_bc4a6af53bb79f0d31dddb6e386558a8_avoslocker.exe

  • Size

    1.3MB

  • MD5

    bc4a6af53bb79f0d31dddb6e386558a8

  • SHA1

    4ea02bdc054b113f4e3f21d1c9381daf1b5cb226

  • SHA256

    577fcd8ff08b52ef4bd27aec199c11157155d5c513eb1b8b4a0950647cc91a45

  • SHA512

    e51af074e1c69bb800401dd0d9500b5f7331514b5ff52aa592014228c7f89bdbfda3761b53e0ff0a07c222fc580cf20e81591812dbcdb962c6e55d4e69aa43aa

  • SSDEEP

    24576:W2zEYytjjqNSlhvpfQiIhKPtehfQ7r9qySkbgedaqMrfUgYbkhqfj8uqw:WPtjtQiIhUyQd1SkFd+rfPOkhqvq

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-25_bc4a6af53bb79f0d31dddb6e386558a8_avoslocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-25_bc4a6af53bb79f0d31dddb6e386558a8_avoslocker.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2392
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    PID:3008

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\System32\alg.exe

    Filesize

    644KB

    MD5

    b3ea8e1f2ed95f1534851d0039493b34

    SHA1

    7ce1f752f1e0cffeb35f1752aa9861cbb2bd5942

    SHA256

    d023346deb94c5fc960b5e1667b2a3534c68385be5719167e3df4fe65fbcc574

    SHA512

    3529dea9d6362663d635949c3dc735406c5ffbaf069feae25c62682d09f501c618993028acce2bc3ce03c4a30c676f84e2f0a442126a35a4d67a1fd4a59a07b4

  • memory/2392-0-0x0000000000400000-0x0000000000554000-memory.dmp

    Filesize

    1.3MB

  • memory/2392-6-0x0000000000560000-0x00000000005C7000-memory.dmp

    Filesize

    412KB

  • memory/2392-7-0x0000000000560000-0x00000000005C7000-memory.dmp

    Filesize

    412KB

  • memory/2392-20-0x0000000000400000-0x0000000000554000-memory.dmp

    Filesize

    1.3MB

  • memory/3008-15-0x0000000100000000-0x00000001000A4000-memory.dmp

    Filesize

    656KB

  • memory/3008-21-0x0000000100000000-0x00000001000A4000-memory.dmp

    Filesize

    656KB