General
-
Target
testing.exe
-
Size
1.1MB
-
Sample
241225-q22fvavkcp
-
MD5
2f6b9891e81a5c69016ef0565cb6f436
-
SHA1
3445e6f4e58e294fe973c00e3abe50e1a72ccdde
-
SHA256
3c848d6123bfb14ad845243fcccc754b3afedac7cf5bfcfddc0459586ef3768d
-
SHA512
a1608ed020a9c5434735ef15738995cde75aeaff7a2ee6d1114ad0926037d692700330d6224f39736be6b8491ebcd3c0142a26a86b1cecc94c86b253a04f6667
-
SSDEEP
24576:DImw98okVgela0as5CqLVO7XJCjkD3N0HRA:lL5ljasaU
Static task
static1
Behavioral task
behavioral1
Sample
testing.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
testing.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
testing.exe
-
Size
1.1MB
-
MD5
2f6b9891e81a5c69016ef0565cb6f436
-
SHA1
3445e6f4e58e294fe973c00e3abe50e1a72ccdde
-
SHA256
3c848d6123bfb14ad845243fcccc754b3afedac7cf5bfcfddc0459586ef3768d
-
SHA512
a1608ed020a9c5434735ef15738995cde75aeaff7a2ee6d1114ad0926037d692700330d6224f39736be6b8491ebcd3c0142a26a86b1cecc94c86b253a04f6667
-
SSDEEP
24576:DImw98okVgela0as5CqLVO7XJCjkD3N0HRA:lL5ljasaU
-
Avoslocker Ransomware
Avoslocker is a relatively new ransomware, that was observed in late June and early July, 2021.
-
Avoslocker family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Renames multiple (10387) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Windows Management Instrumentation
1Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
1