Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/07/2024, 00:01

General

  • Target

    2024-07-04_13c9656a0853d2327c1c744202bf1ddf_avoslocker.exe

  • Size

    6.8MB

  • MD5

    13c9656a0853d2327c1c744202bf1ddf

  • SHA1

    9ef1088651e903db3bb771e4cb17467c3490e5e3

  • SHA256

    5fbbb281aba1258dea6ec733935dde5977983430fc5939ea7aef7624d3306a01

  • SHA512

    339b99a10b922964c154606a7fb36e5121ff00767280c5f3f46080f6880488cbc00938b0fe4851dd7af01828af9b0a8bcb6eaa45c266feb7551572d3d90872d7

  • SSDEEP

    98304:H9rOvi3HzBvnKFn0MeYttysOx6VamqSJ5a4f+Wb/L3:drOvijBGnBeYtAX+q05aW+Er

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-07-04_13c9656a0853d2327c1c744202bf1ddf_avoslocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-07-04_13c9656a0853d2327c1c744202bf1ddf_avoslocker.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:5024
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 5024 -s 2388
      2⤵
      • Program crash
      PID:4048
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5024 -ip 5024
    1⤵
      PID:5000

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\{57C51C22-0DC2-4471-B0C9-19150AFD8359}\CCDInstaller.js

      Filesize

      1.2MB

      MD5

      698687ac9e653b2c7a1b0d2a2ec40505

      SHA1

      ad6959510eff569cff355f2ac4c5988a6d6a433e

      SHA256

      142db397e43384d0af407ad59ed5b64371cf054b7645913592ca72d2d848c1c9

      SHA512

      29c5971005bac00173c96bc3b7ffc4fd5701d2f7ff5a29fc05bd8832ff2b1c850903ebed72baa6e4bbcaa0c6b14670ba1e59d900f3087c0fdb0453bea5d150eb

    • C:\Users\Admin\AppData\Local\Temp\{57C51C22-0DC2-4471-B0C9-19150AFD8359}\index.html

      Filesize

      426B

      MD5

      a28ab17b18ff254173dfeef03245efd0

      SHA1

      c6ce20924565644601d4e0dd0fba9dde8dea5c77

      SHA256

      886c0ab69e6e9d9d5b5909451640ea587accfcdf11b8369cad8542d1626ac375

      SHA512

      9371a699921b028bd93c35f9f2896d9997b906c8aba90dd4279abba0ae1909a8808a43bf829584e552ccfe534b2c991a5a7e3e3de7618343f50b1c47cff269d6