Analysis

  • max time kernel
    94s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/09/2024, 10:50

General

  • Target

    2024-09-12_6ef99242896a86612da86a92875aa0c8_avoslocker_hijackloader_metamorfo_revil.exe

  • Size

    21.3MB

  • MD5

    6ef99242896a86612da86a92875aa0c8

  • SHA1

    39f09435a8e64f4f6b776457a5a524cca33ba986

  • SHA256

    8323cf8611c5e7f970b54cc734dc3a27d9ddb3ecee451287782415fc803f5b7e

  • SHA512

    69042df7fc806b5cddd2853431ed407327be795458aa2da521e824d6af2cd1dd6beec46e001e7bcaa192e6003cfca3d6250ee918ed1447790ae5a410da16ba9c

  • SSDEEP

    196608:f1wAT/Y/rja3K6RHUsvp2fA0rqNb8aUQGXdXCSxgJy:fO3PaWfzrqNbF/GXdTx

Score
4/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 3 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-12_6ef99242896a86612da86a92875aa0c8_avoslocker_hijackloader_metamorfo_revil.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-12_6ef99242896a86612da86a92875aa0c8_avoslocker_hijackloader_metamorfo_revil.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Modifies system certificate store
    PID:5000

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\PDF Suite 2021\Installation\PlayaSDK\PlayaSDK.dll

    Filesize

    960KB

    MD5

    11a813c0972b740937d3a7e2daf9ffcb

    SHA1

    4245b5a3c97f725c56a29d745767edebb5e3f15d

    SHA256

    3f933bced2d9f65d48f7c48715bf286fd431341a74e1ce15d39b7c4c96603cf9

    SHA512

    9a590dcab0cf7051d04743736ea7a6b74fa0f87539580cc41a58ad33a76574201e7b6d54d5100cbcd262266bc55b053243edd4860a2d43deeb1c164395e4a941