Analysis
-
max time kernel
144s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 11:29
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-18_69eeec77c0b557296efb8d362864480e_avoslocker_revil.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-08-18_69eeec77c0b557296efb8d362864480e_avoslocker_revil.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-18_69eeec77c0b557296efb8d362864480e_avoslocker_revil.exe
-
Size
4.3MB
-
MD5
69eeec77c0b557296efb8d362864480e
-
SHA1
3d67c77e6f378eae7d2129f7610a86b772b38886
-
SHA256
91ad4c0e81591e4295c3b2a2c0e4e88984ca285eb986188193c6f395278f8fb7
-
SHA512
a6db87a5047341e9a175cc6832d5a975787ec42e1cb3d4ffed260b0ce565e9abab2b6ed16d2051ebeeb1c04a0b4af6d4a506a8e0f4969cef45b45f169bde18cc
-
SSDEEP
98304:iswIe2XyYx+Ak+zOheEbgin7JE05fM8dKTDv9wc4hz4On+xEJ:iUxXyYx+/+KhNbgin7jW/9wJbt
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-18_69eeec77c0b557296efb8d362864480e_avoslocker_revil.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 2024-08-18_69eeec77c0b557296efb8d362864480e_avoslocker_revil.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\IESettingSync 2024-08-18_69eeec77c0b557296efb8d362864480e_avoslocker_revil.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" 2024-08-18_69eeec77c0b557296efb8d362864480e_avoslocker_revil.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 2024-08-18_69eeec77c0b557296efb8d362864480e_avoslocker_revil.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4500 2024-08-18_69eeec77c0b557296efb8d362864480e_avoslocker_revil.exe 4500 2024-08-18_69eeec77c0b557296efb8d362864480e_avoslocker_revil.exe 4500 2024-08-18_69eeec77c0b557296efb8d362864480e_avoslocker_revil.exe 4500 2024-08-18_69eeec77c0b557296efb8d362864480e_avoslocker_revil.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4500 2024-08-18_69eeec77c0b557296efb8d362864480e_avoslocker_revil.exe 4500 2024-08-18_69eeec77c0b557296efb8d362864480e_avoslocker_revil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-18_69eeec77c0b557296efb8d362864480e_avoslocker_revil.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-18_69eeec77c0b557296efb8d362864480e_avoslocker_revil.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4500
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
314KB
MD52dd0a1de870af34d48d43b7cad82b8d9
SHA1440f4f1fdf17a5c8b426ac6bd4535b8fe5258c7e
SHA256057bc6c47c47aaccdf31adc48a6b401f6090a02c28e354099eff80907dc2af32
SHA51283df193ab984037b940876bf6371020b4bb13af74e988abb8ad6a30d48ab6cd9dc5c08937e58abab93278cc85c9d79c373688b2c51c035fdeffed639c933e8ff
-
Filesize
826B
MD537a05031bec9d3e093388407848af66f
SHA15b48a5b72097ad98eacf54e956e94d26710a0493
SHA256cf38f4f8663028beff3a7650a9d426b4116891e8547029b66b8d2a13fad63a48
SHA512db3af55b93e901778a74f462af1f80a3e4181b251b061f858a3a6dadc77f2eaf4760c30f4ef9ae5560418eadb6133d474289c3b84c0e89615670af722d8dab9f