Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-09-2024 08:14
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe
-
Size
807KB
-
MD5
9593e6fcf3366f0518b40dce630b6351
-
SHA1
7443de0765d0e97b1e31f92070fdd1746c67331f
-
SHA256
7d1e470e36c68e1156a7828f8002254dcde68dc61f998ab5636c12ba63f472dd
-
SHA512
afd962db6af6e2f3ccb6ce467431d22bb9a1209840341f07a8f2e8e724e4f1ae7da786cbe53a399fc289226796e96ec7fad43f1d6750304c6a84aae1ef8c5195
-
SSDEEP
12288:0Z4s3rg9u/2/oT+NXtHLlP/O+OeO+OeNhBBhhBBAtHg9rjI+LXJ0ivlzkHBDsYAS:u4s+oT+NXBLi0rjFXvyHBlbiCZa8
Malware Config
Signatures
-
Avoslocker Ransomware
Avoslocker is a relatively new ransomware, that was observed in late June and early July, 2021.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 2920 bcdedit.exe 1296 bcdedit.exe -
Renames multiple (10403) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\247783023.png" reg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Windows NT\TableTextService\ja-JP\GET_YOUR_FILES_BACK.txt 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\fr-FR\chkrzm.exe.mui 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File created C:\Program Files\Microsoft Games\Hearts\it-IT\GET_YOUR_FILES_BACK.txt 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099168.JPG 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0239063.WMF 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0297229.WMF 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File created C:\Program Files (x86)\Google\GET_YOUR_FILES_BACK.txt 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.jface.databinding.nl_ja_4.4.0.v20140623020002.jar 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\js\GET_YOUR_FILES_BACK.txt 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File created C:\Program Files (x86)\Microsoft Office\Office14\OneNote\GET_YOUR_FILES_BACK.txt 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightOrange\TAB_OFF.GIF 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\btn_close_over.png 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_divider_left.png 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18187_.WMF 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\IN00919_.WMF 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\requests\vlm_cmd.xml 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Port_of_Spain 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\Common Files\System\msadc\de-DE\msadcfr.dll.mui 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\1px.gif 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\GET_YOUR_FILES_BACK.txt 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Black Tie.thmx 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_btn-previous-over-select.png 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\1047x576black.png 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00485_.WMF 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File created C:\Program Files (x86)\Common Files\System\msadc\ja-JP\GET_YOUR_FILES_BACK.txt 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\logo.png 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File created C:\Program Files\Windows NT\GET_YOUR_FILES_BACK.txt 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\Windows Media Player\it-IT\WMPDMC.exe.mui 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File created C:\Program Files\VideoLAN\VLC\locale\sw\GET_YOUR_FILES_BACK.txt 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Argentina\Cordoba 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\images\base-docked.png 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR47F.GIF 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00013_.WMF 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLUECALM\GET_YOUR_FILES_BACK.txt 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\images\glass_lrg.png 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File created C:\Program Files\VideoLAN\VLC\locale\sk\LC_MESSAGES\GET_YOUR_FILES_BACK.txt 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\js\picturePuzzle.js 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Swirl\GET_YOUR_FILES_BACK.txt 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightOrange\GET_YOUR_FILES_BACK.txt 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\css\settings.css 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\license.html 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT-12 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Notes_LOOP_BG.wmv 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\it-IT\PhotoAcq.dll.mui 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO02054_.WMF 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SLATE\THMBNAIL.PNG 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107042.WMF 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\css\settings.css 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\js\settings.js 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_left_disabled.png 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\PreviousMenuButtonIconSubpi.png 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\ResourceInternal.zip 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Median.xml 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BS00439_.WMF 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\js\cpu.js 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\de-DE\Hearts.exe.mui 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4_basestyle.css 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0296288.WMF 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD15132_.GIF 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\Java\jre7\lib\fonts\LucidaBrightRegular.ttf 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-api-caching.xml 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\sports_disc_mask.png 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_gray_snow.png 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\License Agreements\SynchronizationEula.rtf 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe -
pid Process 1592 powershell.exe 6012 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1612 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3028 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe 1592 powershell.exe 6012 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 3028 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe Token: SeIncreaseQuotaPrivilege 1556 WMIC.exe Token: SeSecurityPrivilege 1556 WMIC.exe Token: SeTakeOwnershipPrivilege 1556 WMIC.exe Token: SeLoadDriverPrivilege 1556 WMIC.exe Token: SeSystemProfilePrivilege 1556 WMIC.exe Token: SeSystemtimePrivilege 1556 WMIC.exe Token: SeProfSingleProcessPrivilege 1556 WMIC.exe Token: SeIncBasePriorityPrivilege 1556 WMIC.exe Token: SeCreatePagefilePrivilege 1556 WMIC.exe Token: SeBackupPrivilege 1556 WMIC.exe Token: SeRestorePrivilege 1556 WMIC.exe Token: SeShutdownPrivilege 1556 WMIC.exe Token: SeDebugPrivilege 1556 WMIC.exe Token: SeSystemEnvironmentPrivilege 1556 WMIC.exe Token: SeRemoteShutdownPrivilege 1556 WMIC.exe Token: SeUndockPrivilege 1556 WMIC.exe Token: SeManageVolumePrivilege 1556 WMIC.exe Token: 33 1556 WMIC.exe Token: 34 1556 WMIC.exe Token: 35 1556 WMIC.exe Token: SeDebugPrivilege 1592 powershell.exe Token: SeBackupPrivilege 1592 powershell.exe Token: SeSecurityPrivilege 1592 powershell.exe Token: SeIncreaseQuotaPrivilege 1556 WMIC.exe Token: SeSecurityPrivilege 1556 WMIC.exe Token: SeTakeOwnershipPrivilege 1556 WMIC.exe Token: SeLoadDriverPrivilege 1556 WMIC.exe Token: SeSystemProfilePrivilege 1556 WMIC.exe Token: SeSystemtimePrivilege 1556 WMIC.exe Token: SeProfSingleProcessPrivilege 1556 WMIC.exe Token: SeIncBasePriorityPrivilege 1556 WMIC.exe Token: SeCreatePagefilePrivilege 1556 WMIC.exe Token: SeBackupPrivilege 1556 WMIC.exe Token: SeRestorePrivilege 1556 WMIC.exe Token: SeShutdownPrivilege 1556 WMIC.exe Token: SeDebugPrivilege 1556 WMIC.exe Token: SeSystemEnvironmentPrivilege 1556 WMIC.exe Token: SeRemoteShutdownPrivilege 1556 WMIC.exe Token: SeUndockPrivilege 1556 WMIC.exe Token: SeManageVolumePrivilege 1556 WMIC.exe Token: 33 1556 WMIC.exe Token: 34 1556 WMIC.exe Token: 35 1556 WMIC.exe Token: SeBackupPrivilege 3288 vssvc.exe Token: SeRestorePrivilege 3288 vssvc.exe Token: SeAuditPrivilege 3288 vssvc.exe Token: SeBackupPrivilege 1592 powershell.exe Token: SeBackupPrivilege 1592 powershell.exe Token: SeSecurityPrivilege 1592 powershell.exe Token: SeBackupPrivilege 1592 powershell.exe Token: SeBackupPrivilege 1592 powershell.exe Token: SeSecurityPrivilege 1592 powershell.exe Token: SeBackupPrivilege 1592 powershell.exe Token: SeBackupPrivilege 1592 powershell.exe Token: SeSecurityPrivilege 1592 powershell.exe Token: SeBackupPrivilege 1592 powershell.exe Token: SeBackupPrivilege 1592 powershell.exe Token: SeSecurityPrivilege 1592 powershell.exe Token: SeBackupPrivilege 1592 powershell.exe Token: SeBackupPrivilege 1592 powershell.exe Token: SeSecurityPrivilege 1592 powershell.exe Token: SeBackupPrivilege 1592 powershell.exe Token: SeSecurityPrivilege 1592 powershell.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2740 3028 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe 31 PID 3028 wrote to memory of 2740 3028 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe 31 PID 3028 wrote to memory of 2740 3028 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe 31 PID 3028 wrote to memory of 2740 3028 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe 31 PID 3028 wrote to memory of 2756 3028 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe 32 PID 3028 wrote to memory of 2756 3028 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe 32 PID 3028 wrote to memory of 2756 3028 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe 32 PID 3028 wrote to memory of 2756 3028 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe 32 PID 3028 wrote to memory of 2760 3028 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe 33 PID 3028 wrote to memory of 2760 3028 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe 33 PID 3028 wrote to memory of 2760 3028 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe 33 PID 3028 wrote to memory of 2760 3028 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe 33 PID 3028 wrote to memory of 2776 3028 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe 34 PID 3028 wrote to memory of 2776 3028 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe 34 PID 3028 wrote to memory of 2776 3028 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe 34 PID 3028 wrote to memory of 2776 3028 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe 34 PID 3028 wrote to memory of 2800 3028 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe 35 PID 3028 wrote to memory of 2800 3028 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe 35 PID 3028 wrote to memory of 2800 3028 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe 35 PID 3028 wrote to memory of 2800 3028 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe 35 PID 2800 wrote to memory of 1592 2800 cmd.exe 36 PID 2800 wrote to memory of 1592 2800 cmd.exe 36 PID 2800 wrote to memory of 1592 2800 cmd.exe 36 PID 2740 wrote to memory of 1556 2740 cmd.exe 37 PID 2740 wrote to memory of 1556 2740 cmd.exe 37 PID 2740 wrote to memory of 1556 2740 cmd.exe 37 PID 2760 wrote to memory of 2920 2760 cmd.exe 43 PID 2760 wrote to memory of 2920 2760 cmd.exe 43 PID 2760 wrote to memory of 2920 2760 cmd.exe 43 PID 2776 wrote to memory of 1296 2776 cmd.exe 39 PID 2776 wrote to memory of 1296 2776 cmd.exe 39 PID 2776 wrote to memory of 1296 2776 cmd.exe 39 PID 2756 wrote to memory of 1612 2756 cmd.exe 40 PID 2756 wrote to memory of 1612 2756 cmd.exe 40 PID 2756 wrote to memory of 1612 2756 cmd.exe 40 PID 3028 wrote to memory of 6012 3028 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe 45 PID 3028 wrote to memory of 6012 3028 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe 45 PID 3028 wrote to memory of 6012 3028 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe 45 PID 3028 wrote to memory of 6012 3028 2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe 45 PID 6012 wrote to memory of 5560 6012 powershell.exe 46 PID 6012 wrote to memory of 5560 6012 powershell.exe 46 PID 6012 wrote to memory of 5560 6012 powershell.exe 46 PID 6012 wrote to memory of 5924 6012 powershell.exe 47 PID 6012 wrote to memory of 5924 6012 powershell.exe 47 PID 6012 wrote to memory of 5924 6012 powershell.exe 47 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-23_9593e6fcf3366f0518b40dce630b6351_avoslocker_cobalt-strike.exe"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\system32\cmd.execmd /c wmic shadowcopy delete /nointeractive2⤵
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1556
-
-
-
C:\Windows\system32\cmd.execmd /c vssadmin.exe Delete Shadows /All /Quiet2⤵
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:1612
-
-
-
C:\Windows\system32\cmd.execmd /c bcdedit /set {default} recoveryenabled No2⤵
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:2920
-
-
-
C:\Windows\system32\cmd.execmd /c bcdedit /set {default} bootstatuspolicy ignoreallfailures2⤵
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵
- Modifies boot configuration data using bcdedit
PID:1296
-
-
-
C:\Windows\system32\cmd.execmd /c powershell -command "Get-EventLog -LogName * | ForEach { Clear-EventLog $_.Log }"2⤵
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "Get-EventLog -LogName * | ForEach { Clear-EventLog $_.Log }"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1592
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$a = [System.IO.File]::ReadAllText(\"C:\GET_YOUR_FILES_BACK.txt\");Add-Type -AssemblyName System.Drawing;$filename = \"$env:temp\$(Get-Random).png\";$bmp = new-object System.Drawing.Bitmap 1920,1080;$font = new-object System.Drawing.Font Consolas,10;$brushBg = [System.Drawing.Brushes]::Black;$brushFg = [System.Drawing.Brushes]::White;$format = [System.Drawing.StringFormat]::GenericDefault;$format.Alignment = [System.Drawing.StringAlignment]::Center;$format.LineAlignment = [System.Drawing.StringAlignment]::Center;$graphics = [System.Drawing.Graphics]::FromImage($bmp);$graphics.FillRectangle($brushBg,0,0,$bmp.Width,$bmp.Height);$graphics.DrawString($a,$font,$brushFg,[System.Drawing.RectangleF]::FromLTRB(0, 0, 1920, 1080),$format);$graphics.Dispose();$bmp.Save($filename);reg add \"HKEY_CURRENT_USER\Control Panel\Desktop\" /v Wallpaper /t REG_SZ /d $filename /f;Start-Sleep 1;rundll32.exe user32.dll, UpdatePerUserSystemParameters, 0, $false;"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:6012 -
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add "HKEY_CURRENT_USER\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\247783023.png /f3⤵
- Sets desktop wallpaper using registry
PID:5560
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" user32.dll UpdatePerUserSystemParameters 0 False3⤵PID:5924
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3288
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵PID:2920
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Windows Management Instrumentation
1Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e88368c43d7de561cfbedc2b648244da
SHA144ec9116dd8dfe89df6549f96ec18dccef15cd20
SHA2566ab96b28dc9bc5dd0130e8eee1a8810b87b60feeff054a6a8fa509110aaaa881
SHA512e123f63bd0ff2507634c16832d71e3be6f9e52b39df4b1bd3003035f68c1c4c5692cf3cd566cfca4247569e7fe8da0c40aea2f78b9a7797def8de8b0eeef28fd
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD51a65aed315425671eea1a56e72ad8b03
SHA1b51e4268f35b7eec4a29744047cc618af0cd4614
SHA256f11364f50429da1c0d63e9d1b138998d73780a81c1b8ac4a62177a21ae9f5ea6
SHA512e6bdade527f3e9ed8508ee636b537e6f7eedeb3aa2aac073eee57e611083ee1973708b2b56ef7978b90bb6e22947be56c299a59bafdcd124a8f9b0f7dccb5347