Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 18:35
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-12_8c5ebc76d17808c05ae40e6a53ca97e0_avoslocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-12_8c5ebc76d17808c05ae40e6a53ca97e0_avoslocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-12_8c5ebc76d17808c05ae40e6a53ca97e0_avoslocker.exe
-
Size
1.2MB
-
MD5
8c5ebc76d17808c05ae40e6a53ca97e0
-
SHA1
8dbb671fb9e9389f7e0c7d76e14ac7b85db049e0
-
SHA256
33a97f58353d5cf4e308ed9da749b889f63b7aed59b103ddbd23c92b4f52b369
-
SHA512
d640b80ce57e5269e3a9d7d0625309cca0009cfe0b42e97c6f241794b4fc99f96549edea8e23b80b1df892c372968715853ebbfae0c200742876bc503b366f36
-
SSDEEP
24576:51luT9WOb3aK0UKnKv1zb3gK3LoR6tdv0GawVZlBYQD2hqwCIrDB9E4+tb4sydOU:TluTXWKkn+1vJ7ztdvFnlj2Qo19R04fd
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1120 2024-10-12_8c5ebc76d17808c05ae40e6a53ca97e0_avoslocker.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-12_8c5ebc76d17808c05ae40e6a53ca97e0_avoslocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-12_8c5ebc76d17808c05ae40e6a53ca97e0_avoslocker.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5072 wrote to memory of 1120 5072 2024-10-12_8c5ebc76d17808c05ae40e6a53ca97e0_avoslocker.exe 84 PID 5072 wrote to memory of 1120 5072 2024-10-12_8c5ebc76d17808c05ae40e6a53ca97e0_avoslocker.exe 84 PID 5072 wrote to memory of 1120 5072 2024-10-12_8c5ebc76d17808c05ae40e6a53ca97e0_avoslocker.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-12_8c5ebc76d17808c05ae40e6a53ca97e0_avoslocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-12_8c5ebc76d17808c05ae40e6a53ca97e0_avoslocker.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\e5791ff\2024-10-12_8c5ebc76d17808c05ae40e6a53ca97e0_avoslocker.exe-run=1 -shortcut="C:\Users\Admin\AppData\Local\Temp\2024-10-12_8c5ebc76d17808c05ae40e6a53ca97e0_avoslocker.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1120
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\e5791ff\2024-10-12_8c5ebc76d17808c05ae40e6a53ca97e0_avoslocker.exe
Filesize1.2MB
MD58c5ebc76d17808c05ae40e6a53ca97e0
SHA18dbb671fb9e9389f7e0c7d76e14ac7b85db049e0
SHA25633a97f58353d5cf4e308ed9da749b889f63b7aed59b103ddbd23c92b4f52b369
SHA512d640b80ce57e5269e3a9d7d0625309cca0009cfe0b42e97c6f241794b4fc99f96549edea8e23b80b1df892c372968715853ebbfae0c200742876bc503b366f36