Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 21:08
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-25_bc4a6af53bb79f0d31dddb6e386558a8_avoslocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-05-25_bc4a6af53bb79f0d31dddb6e386558a8_avoslocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-25_bc4a6af53bb79f0d31dddb6e386558a8_avoslocker.exe
-
Size
1.3MB
-
MD5
bc4a6af53bb79f0d31dddb6e386558a8
-
SHA1
4ea02bdc054b113f4e3f21d1c9381daf1b5cb226
-
SHA256
577fcd8ff08b52ef4bd27aec199c11157155d5c513eb1b8b4a0950647cc91a45
-
SHA512
e51af074e1c69bb800401dd0d9500b5f7331514b5ff52aa592014228c7f89bdbfda3761b53e0ff0a07c222fc580cf20e81591812dbcdb962c6e55d4e69aa43aa
-
SSDEEP
24576:W2zEYytjjqNSlhvpfQiIhKPtehfQ7r9qySkbgedaqMrfUgYbkhqfj8uqw:WPtjtQiIhUyQd1SkFd+rfPOkhqvq
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 480 Process not Found 3008 alg.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe 2024-05-25_bc4a6af53bb79f0d31dddb6e386558a8_avoslocker.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\Adobe\Adobe PCD\pcd.db 2024-05-25_bc4a6af53bb79f0d31dddb6e386558a8_avoslocker.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\caps\hdpim.db 2024-05-25_bc4a6af53bb79f0d31dddb6e386558a8_avoslocker.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\caps\hdpim.db-journal 2024-05-25_bc4a6af53bb79f0d31dddb6e386558a8_avoslocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2392 2024-05-25_bc4a6af53bb79f0d31dddb6e386558a8_avoslocker.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_bc4a6af53bb79f0d31dddb6e386558a8_avoslocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-25_bc4a6af53bb79f0d31dddb6e386558a8_avoslocker.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:2392
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
PID:3008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
644KB
MD5b3ea8e1f2ed95f1534851d0039493b34
SHA17ce1f752f1e0cffeb35f1752aa9861cbb2bd5942
SHA256d023346deb94c5fc960b5e1667b2a3534c68385be5719167e3df4fe65fbcc574
SHA5123529dea9d6362663d635949c3dc735406c5ffbaf069feae25c62682d09f501c618993028acce2bc3ce03c4a30c676f84e2f0a442126a35a4d67a1fd4a59a07b4