Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/06/2024, 16:47

General

  • Target

    2024-06-06_10eae49c87155bf9cf0962632bfe9f7b_avoslocker.exe

  • Size

    1.3MB

  • MD5

    10eae49c87155bf9cf0962632bfe9f7b

  • SHA1

    da0a50f9600276c68d8994cf2ba54721991ac2f2

  • SHA256

    bd5fdd72953e70e94a99626382d963c2f5aa82c4ef1ece4ae7f653900ab00745

  • SHA512

    90297ec093ae008fdb8ac1e37afd4980c7ed5098591525bd2b99ed533b8044280e34d64a2428fef328ee16985d7d69b832f4e00425e0935a2b39a11e8f1201f4

  • SSDEEP

    24576:t2zEYytjjqNSlhvpfQiIhKPtehfQ7r9qySkbgedTu6JIx2RBAmAWYb18Qn:tPtjtQiIhUyQd1SkFdnIufA8

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-06_10eae49c87155bf9cf0962632bfe9f7b_avoslocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-06_10eae49c87155bf9cf0962632bfe9f7b_avoslocker.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    PID:1800
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    PID:4016

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\System32\alg.exe

          Filesize

          661KB

          MD5

          973fc17a0932c2417cc3fa2ae374c324

          SHA1

          7e76504e7d3f9fad5d7c800f850c09ef92f0cdc7

          SHA256

          c69d279fa32f18e90c7a9a3183d337f25a76248b72bfa9440187daba5d22cb7c

          SHA512

          ea78a7baf34e99102d7d7203639791fafc60ba878628ba7ecf04cf0fc94177f70e732d4de2790b78fef8c6bf28d7717e41104651cac8cfdc74d245699a1bff20

        • memory/1800-6-0x00000000022C0000-0x0000000002326000-memory.dmp

          Filesize

          408KB

        • memory/1800-1-0x00000000022C0000-0x0000000002326000-memory.dmp

          Filesize

          408KB

        • memory/1800-18-0x0000000000400000-0x0000000000554000-memory.dmp

          Filesize

          1.3MB

        • memory/1800-0-0x0000000000400000-0x0000000000554000-memory.dmp

          Filesize

          1.3MB

        • memory/4016-11-0x0000000140000000-0x00000001400AA000-memory.dmp

          Filesize

          680KB

        • memory/4016-19-0x0000000140000000-0x00000001400AA000-memory.dmp

          Filesize

          680KB