Analysis

  • max time kernel
    95s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/09/2024, 17:00

General

  • Target

    2024-09-27_456fa0e3c8dac4b0601aae86f24183ea_avoslocker.exe

  • Size

    2.0MB

  • MD5

    456fa0e3c8dac4b0601aae86f24183ea

  • SHA1

    b818914aaf00c6817169cfc30f37812b807013e2

  • SHA256

    6365be55d95a945a7d126efc1ab301fde9821c799b68a7f957b18fb6c68b118c

  • SHA512

    542c28798bf1ca234be2eef5d0fac7138b0baf037b65452abbc6570d3d910b79c4891197328b8fb927bb82c6eb29f42f08f0fcb79caf8c805493b1b6fd09cdd7

  • SSDEEP

    49152:lencs7Qc0FK79/Ves7FozshjPHYnsABxi4Dmg27RnWGj:lency/Ves7WwhjPGD527BWG

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-27_456fa0e3c8dac4b0601aae86f24183ea_avoslocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-27_456fa0e3c8dac4b0601aae86f24183ea_avoslocker.exe"
    1⤵
    • Checks computer location settings
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:228
    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Reader_sl.exe
      "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Reader_sl.exe"
      2⤵
        PID:2124

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\ProgramData\Adobe\ARM\{291AA914-A987-4CE9-BD63-AC0A92D435E5}\RdrManifest2.msi

            Filesize

            14KB

            MD5

            0162a7a6ca55dd442e64f02c36187314

            SHA1

            24392ff794633445f4fe12a8a422046d24d67482

            SHA256

            5aa41c7e3160dca492317182e2cf5ad947e91457b5d4a39fc5d7aabcc0c9dd8c

            SHA512

            36e1fa17e868670b433206734fe028ce6b05dc3c6266c557342152fb3cb1984455fe6a9345c877eff394bf6959c6130a861ce7f30004d23c4a580227256a6332

          • C:\Users\Admin\AppData\Local\Temp\ReportUpdaterPolicy3672.txt

            Filesize

            4B

            MD5

            455831477b82574f6bf871193f2f761d

            SHA1

            f44217a81173869e08671753c52553646ff5d95b

            SHA256

            69bf0bc46f51b33377c4f3d92caf876714f6bbbe99e7544487327920873f9820

            SHA512

            cbc0ee58e447428bdcf72fc8b03c8cfb086edbb14205b918e75ebeff1d85ff1dd254e9dcb387afbd3fa766c803937c306e0a2a79870c0d87abcb7ab93661cf85

          • C:\Users\Admin\AppData\Local\Temp\TmpABC1.tmp

            Filesize

            5KB

            MD5

            590f0b893183a18322bb52632a7540eb

            SHA1

            0f7afb477bc8694f775b9d2b9d35f8c1e3c9e127

            SHA256

            66d5c55eb3662a2084ba3bdbacde986fb4bc52c4a5f23b4590bfa08a3ee13788

            SHA512

            11c5370921149fe3d45e6f3072e5a55ff87eb819ca2e70dd3c54c2c6d54c3f0285e6838d2ddc6580858819e03117e226ebe8c1200e2b275fae84f064eb4162ab

          • C:\Users\Admin\AppData\Local\Temp\TmpC8C0.tmp

            Filesize

            5KB

            MD5

            5db0f39788f404c09fb17c3486a00976

            SHA1

            8776e275612490445d2213e572795b60c7abdcaf

            SHA256

            699406274826aeb8e1fb1083b8c85e8ca2deb283d9c9070eed9317cea54020e3

            SHA512

            7d1a660aa72dc18370d2765ff25201bf07a2e5d2ff29c6a6f0230922908b5a7404ccf237d2ca17683be713e8a2b8b91898eaaa808f2f6814ce98d1de59357699

          • C:\Users\Admin\AppData\Local\Temp\TmpC96D.tmp

            Filesize

            3KB

            MD5

            fc2430057cb1be74c788f10c2d4540c8

            SHA1

            cab67ee8d5191fbf9f25545825e06c1a822af2f2

            SHA256

            dcc9d2695125406282ba990fec39403c44b12964acf51b5e0dc7f2080d714398

            SHA512

            4e2b9709a9e3ca5173abb35816e5a0aebbf2a7aaf971d7f75f3ae66e4a812cbade103baa5016525f5ab83a60c18f8d3c278c90ff83e4afdae419f81673cb5aee

          • C:\Users\Admin\AppData\Local\Temp\TmpD035.tmp

            Filesize

            3KB

            MD5

            a58599260c64cb41ed7d156db8ac13ef

            SHA1

            fb9396eb1270e9331456a646ebf1419fc283dc06

            SHA256

            aabf92089e16fdb28706356dbc4efb5a81f5277946f2e67695b31676616ed2d2

            SHA512

            6970cbc42e7ec64ccdb8e5633b7017b1e9ec0d4ad094869e221e9275b814b1442b84827996190159543bdb5e86df6885c45197c533d657db4660fca8ad761a71

          • C:\Windows\Temp\ArmReport.ini

            Filesize

            472B

            MD5

            150650f8b4ce06bf6720a55c29275c38

            SHA1

            c69a908cd7138d119f38c8db07031364b1d21388

            SHA256

            9d7407b8bcd4af6820eae7da00db7598246d0f58dc502ef3c89aacbd9cc8a104

            SHA512

            fcfb7f30078c6e1c43cf272b96b5fbd599fb6ea694cbb79a7a3e40de0eea9e031a4b67d1c2f348d3ab19760b48b67758fd7b4ddd921aab9f3e8d3a064c662bd4

          • C:\Windows\Temp\ArmReport.ini

            Filesize

            724B

            MD5

            9d62d227564196c844e892bf220a1298

            SHA1

            444b2371426b3ef7bc372aa40cc96b2428f29e8d

            SHA256

            75c515a974331642bba2005b0d0764cde29ffd6ac526a700e27b9de049c0c6bc

            SHA512

            b421783afc5d58727b8949f3a8db3e361047d99e9248ebdecd13bf60e0e0606dba6d6f6e293d2cc165b2bf0e793ec1076fd204a0d6b73699fdcb0f2bbf9a3e1c

          • C:\Windows\Temp\ArmReport.ini

            Filesize

            762B

            MD5

            77fecba2e448ebb5cc660ec5f94ccc4c

            SHA1

            5e09f9f76c75bb8f43a40caca105f1ba6388079f

            SHA256

            7403a5ed0c85bcb5ce1fe104bd05fcabe10fc978bb6963392222c06b2803cc98

            SHA512

            b8da5c9cd3ca889d96793c08ceb5ffa3f9064f790a143a5d4535512878e8db922a3055809c4fcb640008b9dec0e1233adae075d2a9f7320b9ab1e9b880ad625b

          • C:\Windows\Temp\ArmUI.ini

            Filesize

            234KB

            MD5

            cd12a965da4fb66e7f8a07e3f421196c

            SHA1

            f6377f231362acbd1063aff829ced283a2660b89

            SHA256

            790b06745f32e0f56a7af24c871ffce225ba05ebf0d8f8a71a00c727c97dcf09

            SHA512

            3fa242c3f573c706e0f36b477ce03f47d9ba0712ef72b94eae4f426dfe21ebbaf1dbebb0981335970b5186d416b4d25e175773796486f39e17de1df0a68a9b0d

          • memory/228-122-0x0000000000400000-0x0000000000612000-memory.dmp

            Filesize

            2.1MB

          • memory/228-0-0x0000000000400000-0x0000000000612000-memory.dmp

            Filesize

            2.1MB

          • memory/228-296-0x0000000000400000-0x0000000000612000-memory.dmp

            Filesize

            2.1MB