Analysis

  • max time kernel
    51s
  • max time network
    51s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-06-2024 09:48

General

  • Target

    2024-06-14_f7ad7eaeb140606981f455f793977ea0_avoslocker_revil.exe

  • Size

    6.5MB

  • MD5

    f7ad7eaeb140606981f455f793977ea0

  • SHA1

    90d4b90b7b746c704c826d7900cfac760da64bc8

  • SHA256

    ec2c98d371bc2cb24f6d406ad5ee6b505f64b536c0bee2744d5f77c5cc35794d

  • SHA512

    e41c65192cd29f8e03da0af16c89f0f1090d305df3e4baf0d189ba5a10e0963dfcb423ebff2e2a6a18f9719bb0b0467d87bacf8473990bbe90b5b503ef357a31

  • SSDEEP

    98304:5che4hvsjnWtSfxZu3WTQwFcgdxUFZ9LWEDctV5jIfB4nkmLXzYbS:5SvsjnWcfxZu6LFUZWEDct8BOFGS

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-14_f7ad7eaeb140606981f455f793977ea0_avoslocker_revil.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-14_f7ad7eaeb140606981f455f793977ea0_avoslocker_revil.exe"
    1⤵
    • Drops file in Drivers directory
    • Drops desktop.ini file(s)
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4680
    • C:\Users\Admin\AppData\Local\Temp\542089c7092141fd9f0e8740d1d63cf7.exe
      "C:\Users\Admin\AppData\Local\Temp\542089c7092141fd9f0e8740d1d63cf7.exe" --01
      2⤵
      • Executes dropped EXE
      PID:2300

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\542089c7092141fd9f0e8740d1d63cf7.exe

    Filesize

    6.1MB

    MD5

    9d176ac6ab06c919d68fdc6595832405

    SHA1

    db49ab838d3c20bdb9bb1575d4e085833d0a0763

    SHA256

    99b9c2b58d72836e26df3783e89beb954775d9f7bc1f49016ba24ba4c77405c1

    SHA512

    8ea400238c1723b23f30345415d50eaf7ef57012f9fa8f414bc0f7dbf5db7c4ed7d9d572c0ff96813b796861d020b7ad102f21c3324e9cc680d17616815e8dfd

  • memory/4680-6-0x000000001D480000-0x000000001D4AE000-memory.dmp

    Filesize

    184KB

  • memory/4680-2-0x00007FFF7CC30000-0x00007FFF7D5D1000-memory.dmp

    Filesize

    9.6MB

  • memory/4680-4-0x000000001C6B0000-0x000000001C74C000-memory.dmp

    Filesize

    624KB

  • memory/4680-3-0x000000001C1E0000-0x000000001C6AE000-memory.dmp

    Filesize

    4.8MB

  • memory/4680-5-0x0000000001720000-0x0000000001728000-memory.dmp

    Filesize

    32KB

  • memory/4680-0-0x00007FFF7CEE5000-0x00007FFF7CEE6000-memory.dmp

    Filesize

    4KB

  • memory/4680-9-0x000000001C8E0000-0x000000001C8EA000-memory.dmp

    Filesize

    40KB

  • memory/4680-1-0x00007FFF7CC30000-0x00007FFF7D5D1000-memory.dmp

    Filesize

    9.6MB

  • memory/4680-12-0x00007FFF7CC30000-0x00007FFF7D5D1000-memory.dmp

    Filesize

    9.6MB

  • memory/4680-16-0x000000001E120000-0x000000001E130000-memory.dmp

    Filesize

    64KB

  • memory/4680-17-0x000000001E160000-0x000000001E180000-memory.dmp

    Filesize

    128KB

  • memory/4680-18-0x000000001E1C0000-0x000000001E1D8000-memory.dmp

    Filesize

    96KB

  • memory/4680-20-0x00007FFF7CC30000-0x00007FFF7D5D1000-memory.dmp

    Filesize

    9.6MB