Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 11:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-25_0273a609c7705dd4d44514357d746445_avoslocker_magniber_revil.exe
Resource
win7-20240903-en
General
-
Target
2024-09-25_0273a609c7705dd4d44514357d746445_avoslocker_magniber_revil.exe
-
Size
21.9MB
-
MD5
0273a609c7705dd4d44514357d746445
-
SHA1
a3201cb1f6f72dd334db40e83e1eb22a0db23369
-
SHA256
4f428aab5f909f6ad07881bf08c1e1ceb160c4a1cb53ac9eabb664f7b46487d8
-
SHA512
e7aa8557b2c90bd5c5e2c4f0ea14818fa6a2264c9f05eac34b1ad705db3038832a1253a4e88903eda793952ec0db065fad775848bf2a88049a241c232c46ab81
-
SSDEEP
393216:SK/kMxi5h4DreSca8KlcQnbdBHQVfacMFgXnU7sEl2yD:uh49bbdmVrtXnas
Malware Config
Signatures
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions UUTmNE67emFKI0O.exe -
Executes dropped EXE 2 IoCs
pid Process 3460 UUTmNE67emFKI0O.exe 4392 V23龙图江湖.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: V23龙图江湖.exe File opened (read-only) \??\h: V23龙图江湖.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-25_0273a609c7705dd4d44514357d746445_avoslocker_magniber_revil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UUTmNE67emFKI0O.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language V23龙图江湖.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3460 UUTmNE67emFKI0O.exe 3460 UUTmNE67emFKI0O.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3460 UUTmNE67emFKI0O.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3460 UUTmNE67emFKI0O.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4392 V23龙图江湖.exe 4392 V23龙图江湖.exe 4392 V23龙图江湖.exe 4392 V23龙图江湖.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 216 wrote to memory of 3460 216 2024-09-25_0273a609c7705dd4d44514357d746445_avoslocker_magniber_revil.exe 82 PID 216 wrote to memory of 3460 216 2024-09-25_0273a609c7705dd4d44514357d746445_avoslocker_magniber_revil.exe 82 PID 216 wrote to memory of 3460 216 2024-09-25_0273a609c7705dd4d44514357d746445_avoslocker_magniber_revil.exe 82 PID 216 wrote to memory of 4392 216 2024-09-25_0273a609c7705dd4d44514357d746445_avoslocker_magniber_revil.exe 83 PID 216 wrote to memory of 4392 216 2024-09-25_0273a609c7705dd4d44514357d746445_avoslocker_magniber_revil.exe 83 PID 216 wrote to memory of 4392 216 2024-09-25_0273a609c7705dd4d44514357d746445_avoslocker_magniber_revil.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-25_0273a609c7705dd4d44514357d746445_avoslocker_magniber_revil.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-25_0273a609c7705dd4d44514357d746445_avoslocker_magniber_revil.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Local\Temp\ytool\UUTmNE67emFKI0O.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-25_0273a609c7705dd4d44514357d746445_avoslocker_magniber_revil.exe" "C:\Users\Admin\AppData\Local\Temp\2024-09-25_0273a609c7705dd4d44514357d746445_avoslocker_magniber_revil.exe"2⤵
- Looks for VirtualBox Guest Additions in registry
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3460
-
-
C:\Users\Admin\AppData\Local\Temp\V23龙图江湖.exe"C:\Users\Admin\AppData\Local\Temp\V23龙图江湖.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.9MB
MD508689dd6ca7e0ec325b17dad0ad092bf
SHA1aa08b7ea773059bfa89d2c3cab8d1b2db84a4dea
SHA256a4252fc505b8945c522db88539b15d291d0d569edbdec2a0321f4aa9b53a1c37
SHA512d5c872fa6c040dbe56f1bcb2101f17d36d8ec3444541bc65eb258d85d77947a4e50a156f2132a5d3cc66527cba7bb2df53dbb3f1b9ab61fd33ab93b40333a2bd
-
Filesize
314B
MD544784ec8dd0af6bae90745b3bcac04fe
SHA1d06530374420eb0a505d215c95c1290ca967974b
SHA256649adc9884d3b85ed8c616fe842cb0bce30f07702cea986037f310c12bd559d7
SHA51214e80d4e62c34c42d8d1790d48a4054ac8199462b3d25564970df96b5ea4ea2442c607a09a08f52bcd6b128a392480ce1a4d9db6e3cc8c103fc1ed7f6312eda0
-
Filesize
656B
MD5181376cc9e875ef7d3cdfc4b6e1ee042
SHA13daa8a81aaa57d7a817887d76d120afb89dc207d
SHA256b6cd0f368d5a4432231ac9bfb498215267e46f68a8bf93759c43478d52a8e52f
SHA51254c74726a54dd4f75dd725c91a372c5e26068d64295dca4e108eb182088a1c871842ec85170b55785947b66be8f095e899ffae466b80bf8e02c207f35b872ae6
-
Filesize
4KB
MD5bf12b7b466b76323e9835ac48862f20b
SHA101629e7daaf5226518a3455aec32cd260513de9b
SHA2563f800d52199e577bbc9c35f1220bb620e3f74046fa039b15565a9d62b169a8a1
SHA5120ebfe8260752a91df50499284ae24d676b52726112b53fcd26f2ba8f408bf6ce5298d904d553e3cb50ef48517d7f2e7fc489de5be7fcdfd5c9b41bb237a8c675
-
Filesize
5.7MB
MD5b942a68c780cd816942022d57fb3288a
SHA13416786a91722d56b41e0d1c904ff3051e0e8d7c
SHA256051bf75d8748e00720d04be13acf71290e18b32a4cf14a8a39e318c44814bde7
SHA512c0b1a00b0bc408b8f930f68006dfff72244e85e8f06b1c1ce058feadd9d4d2cb0680daed5003d3c53485cf8eb65431a307f00a8c4474316187d41a1237195f56