Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2024, 21:08
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-25_bc4a6af53bb79f0d31dddb6e386558a8_avoslocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-05-25_bc4a6af53bb79f0d31dddb6e386558a8_avoslocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-25_bc4a6af53bb79f0d31dddb6e386558a8_avoslocker.exe
-
Size
1.3MB
-
MD5
bc4a6af53bb79f0d31dddb6e386558a8
-
SHA1
4ea02bdc054b113f4e3f21d1c9381daf1b5cb226
-
SHA256
577fcd8ff08b52ef4bd27aec199c11157155d5c513eb1b8b4a0950647cc91a45
-
SHA512
e51af074e1c69bb800401dd0d9500b5f7331514b5ff52aa592014228c7f89bdbfda3761b53e0ff0a07c222fc580cf20e81591812dbcdb962c6e55d4e69aa43aa
-
SSDEEP
24576:W2zEYytjjqNSlhvpfQiIhKPtehfQ7r9qySkbgedaqMrfUgYbkhqfj8uqw:WPtjtQiIhUyQd1SkFd+rfPOkhqvq
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4404 alg.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe 2024-05-25_bc4a6af53bb79f0d31dddb6e386558a8_avoslocker.exe File opened for modification C:\Windows\system32\AppVClient.exe 2024-05-25_bc4a6af53bb79f0d31dddb6e386558a8_avoslocker.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\Adobe\Adobe PCD\pcd.db 2024-05-25_bc4a6af53bb79f0d31dddb6e386558a8_avoslocker.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\caps\hdpim.db 2024-05-25_bc4a6af53bb79f0d31dddb6e386558a8_avoslocker.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\caps\hdpim.db-journal 2024-05-25_bc4a6af53bb79f0d31dddb6e386558a8_avoslocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 4712 2024-05-25_bc4a6af53bb79f0d31dddb6e386558a8_avoslocker.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_bc4a6af53bb79f0d31dddb6e386558a8_avoslocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-25_bc4a6af53bb79f0d31dddb6e386558a8_avoslocker.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:4712
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
PID:4404
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4420,i,5047420736443372512,9747851268033796534,262144 --variations-seed-version --mojo-platform-channel-handle=4172 /prefetch:81⤵PID:2136
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
661KB
MD5d8bd1213f90af34265f421389fe07207
SHA118ee3fd2407e52ded48b0e6bf487d37537b228a5
SHA2562babea7e6448302d8dd30b0e82f8f0d9502c64df0ff9b9b7f89ca593bcc9efaa
SHA5120ca8b7ad1a2b186cbb445eb0b3200a83ddd28c9d413a7bb822bde7fa829e834b695443c449e5dd60542bfd7482faf6917b8c00b44cd5d5574615fdd23eb36b37