Analysis
-
max time kernel
51s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14-06-2024 09:48
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-14_f7ad7eaeb140606981f455f793977ea0_avoslocker_revil.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2024-06-14_f7ad7eaeb140606981f455f793977ea0_avoslocker_revil.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-14_f7ad7eaeb140606981f455f793977ea0_avoslocker_revil.exe
-
Size
6.5MB
-
MD5
f7ad7eaeb140606981f455f793977ea0
-
SHA1
90d4b90b7b746c704c826d7900cfac760da64bc8
-
SHA256
ec2c98d371bc2cb24f6d406ad5ee6b505f64b536c0bee2744d5f77c5cc35794d
-
SHA512
e41c65192cd29f8e03da0af16c89f0f1090d305df3e4baf0d189ba5a10e0963dfcb423ebff2e2a6a18f9719bb0b0467d87bacf8473990bbe90b5b503ef357a31
-
SSDEEP
98304:5che4hvsjnWtSfxZu3WTQwFcgdxUFZ9LWEDctV5jIfB4nkmLXzYbS:5SvsjnWcfxZu6LFUZWEDct8BOFGS
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts 2024-06-14_f7ad7eaeb140606981f455f793977ea0_avoslocker_revil.exe -
Executes dropped EXE 1 IoCs
pid Process 2300 542089c7092141fd9f0e8740d1d63cf7.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini 2024-06-14_f7ad7eaeb140606981f455f793977ea0_avoslocker_revil.exe File opened for modification C:\Windows\assembly\Desktop.ini 2024-06-14_f7ad7eaeb140606981f455f793977ea0_avoslocker_revil.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly 2024-06-14_f7ad7eaeb140606981f455f793977ea0_avoslocker_revil.exe File created C:\Windows\assembly\Desktop.ini 2024-06-14_f7ad7eaeb140606981f455f793977ea0_avoslocker_revil.exe File opened for modification C:\Windows\assembly\Desktop.ini 2024-06-14_f7ad7eaeb140606981f455f793977ea0_avoslocker_revil.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4680 wrote to memory of 2300 4680 2024-06-14_f7ad7eaeb140606981f455f793977ea0_avoslocker_revil.exe 84 PID 4680 wrote to memory of 2300 4680 2024-06-14_f7ad7eaeb140606981f455f793977ea0_avoslocker_revil.exe 84 PID 4680 wrote to memory of 2300 4680 2024-06-14_f7ad7eaeb140606981f455f793977ea0_avoslocker_revil.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_f7ad7eaeb140606981f455f793977ea0_avoslocker_revil.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-14_f7ad7eaeb140606981f455f793977ea0_avoslocker_revil.exe"1⤵
- Drops file in Drivers directory
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\542089c7092141fd9f0e8740d1d63cf7.exe"C:\Users\Admin\AppData\Local\Temp\542089c7092141fd9f0e8740d1d63cf7.exe" --012⤵
- Executes dropped EXE
PID:2300
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.1MB
MD59d176ac6ab06c919d68fdc6595832405
SHA1db49ab838d3c20bdb9bb1575d4e085833d0a0763
SHA25699b9c2b58d72836e26df3783e89beb954775d9f7bc1f49016ba24ba4c77405c1
SHA5128ea400238c1723b23f30345415d50eaf7ef57012f9fa8f414bc0f7dbf5db7c4ed7d9d572c0ff96813b796861d020b7ad102f21c3324e9cc680d17616815e8dfd