General
-
Target
testing.exe
-
Size
1.3MB
-
Sample
241225-qypb4svjdr
-
MD5
af7a3708906e1ba0d51e43ce64e72b95
-
SHA1
266af0471cdb6c1e7f682da899c4539abc52e46a
-
SHA256
5277b6dfc55feb2002a93bc92a535360e29b738fb333db5f19be94d1c18b3e52
-
SHA512
989fe2856a3c21d91b70bc2f207b34d05af22d35aaaec2315d991839939c916bd83e4f5849ec289b9b68799ac96b2b041354758c1af967a3717bcdcfe1994892
-
SSDEEP
24576:cImw98okVgela0as5CqLVO7XJCjkD3N0HRAWRiDBN:qL5ljasaU2DBN
Static task
static1
Behavioral task
behavioral1
Sample
testing.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
testing.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
testing.exe
-
Size
1.3MB
-
MD5
af7a3708906e1ba0d51e43ce64e72b95
-
SHA1
266af0471cdb6c1e7f682da899c4539abc52e46a
-
SHA256
5277b6dfc55feb2002a93bc92a535360e29b738fb333db5f19be94d1c18b3e52
-
SHA512
989fe2856a3c21d91b70bc2f207b34d05af22d35aaaec2315d991839939c916bd83e4f5849ec289b9b68799ac96b2b041354758c1af967a3717bcdcfe1994892
-
SSDEEP
24576:cImw98okVgela0as5CqLVO7XJCjkD3N0HRAWRiDBN:qL5ljasaU2DBN
-
Avoslocker Ransomware
Avoslocker is a relatively new ransomware, that was observed in late June and early July, 2021.
-
Avoslocker family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Renames multiple (10408) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Windows Management Instrumentation
1Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
1