Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    29-12-2024 00:22

General

  • Target

    sex.exe

  • Size

    3.2MB

  • MD5

    8723cc503a22121c16aff46292e93864

  • SHA1

    c9a5e6e7e7ddb134a7e16659e344cf5f7f44fe84

  • SHA256

    320bfe152dcc772f7a44379e7929d452dc2221b8cec9bc11344068832a143b6a

  • SHA512

    f45bfb11d9f69613a89bdadc85ec90cb2e3eaa7cf40380e48a028966bcbd4cb9b6a225a16dc09036c1a65d3db9cabecc0c130c7c5c2605f41e53b4f708ecc6c7

  • SSDEEP

    24576:7Imw98okVgela0as5CqLVO7XJCjkD3N0HRAKSUpZr3y2amHY6MdefqTXeZty61ky:9L5ljasaU1Zat81wua7bUScTLTXO+2N

Malware Config

Signatures

  • Avoslocker Ransomware

    Avoslocker is a relatively new ransomware, that was observed in late June and early July, 2021.

  • Avoslocker family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Renames multiple (10407) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Interacts with shadow copies 3 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\sex.exe
    "C:\Users\Admin\AppData\Local\Temp\sex.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1960
    • C:\Users\Admin\AppData\Local\Temp\hack.exe
      "C:\Users\Admin\AppData\Local\Temp\hack.exe"
      2⤵
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2168
      • C:\Windows\system32\cmd.exe
        cmd /c wmic shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2700
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic shadowcopy delete /nointeractive
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3828
      • C:\Windows\system32\cmd.exe
        cmd /c vssadmin.exe Delete Shadows /All /Quiet
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2748
        • C:\Windows\system32\vssadmin.exe
          vssadmin.exe Delete Shadows /All /Quiet
          4⤵
          • Interacts with shadow copies
          PID:2720
      • C:\Windows\system32\cmd.exe
        cmd /c bcdedit /set {default} recoveryenabled No
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2764
        • C:\Windows\system32\bcdedit.exe
          bcdedit /set {default} recoveryenabled No
          4⤵
          • Modifies boot configuration data using bcdedit
          PID:1648
      • C:\Windows\system32\cmd.exe
        cmd /c bcdedit /set {default} bootstatuspolicy ignoreallfailures
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2768
        • C:\Windows\system32\bcdedit.exe
          bcdedit /set {default} bootstatuspolicy ignoreallfailures
          4⤵
          • Modifies boot configuration data using bcdedit
          PID:2916
      • C:\Windows\system32\cmd.exe
        cmd /c powershell -command "Get-EventLog -LogName * | ForEach { Clear-EventLog $_.Log }"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2780
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -command "Get-EventLog -LogName * | ForEach { Clear-EventLog $_.Log }"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4064
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command "$a = [System.IO.File]::ReadAllText(\"C:\GET_YOUR_FILES_BACK.txt\");Add-Type -AssemblyName System.Drawing;$filename = \"$env:temp\$(Get-Random).png\";$bmp = new-object System.Drawing.Bitmap 1920,1080;$font = new-object System.Drawing.Font Consolas,10;$brushBg = [System.Drawing.Brushes]::Black;$brushFg = [System.Drawing.Brushes]::White;$format = [System.Drawing.StringFormat]::GenericDefault;$format.Alignment = [System.Drawing.StringAlignment]::Center;$format.LineAlignment = [System.Drawing.StringAlignment]::Center;$graphics = [System.Drawing.Graphics]::FromImage($bmp);$graphics.FillRectangle($brushBg,0,0,$bmp.Width,$bmp.Height);$graphics.DrawString($a,$font,$brushFg,[System.Drawing.RectangleF]::FromLTRB(0, 0, 1920, 1080),$format);$graphics.Dispose();$bmp.Save($filename);reg add \"HKEY_CURRENT_USER\Control Panel\Desktop\" /v Wallpaper /t REG_SZ /d $filename /f;Start-Sleep 1;rundll32.exe user32.dll, UpdatePerUserSystemParameters, 0, $false;"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3660
        • C:\Windows\system32\reg.exe
          "C:\Windows\system32\reg.exe" add "HKEY_CURRENT_USER\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\1165895028.png /f
          4⤵
          • Sets desktop wallpaper using registry
          PID:1548
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" user32.dll UpdatePerUserSystemParameters 0 False
          4⤵
            PID:3676
      • C:\Users\Admin\AppData\Local\Temp\rufus-4.6p.exe
        "C:\Users\Admin\AppData\Local\Temp\rufus-4.6p.exe"
        2⤵
        • Executes dropped EXE
        PID:2464
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1468

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\hack.exe

      Filesize

      807KB

      MD5

      e27b5291c8fb2dfdeb7f16bb6851df5e

      SHA1

      40207f83b601cd60905c1f807ac0889c80dfe33f

      SHA256

      ffd933ad53f22a0f10cceb4986087258f72dffdd36999b7014c6b37c157ee45f

      SHA512

      2ddbc50cd780ffbf73c354b9b437322eb49cb05bb6f287d54e7dcafb61dc4c4549e37ae2f972f3d240bfa7d2ca485b7583137f1bf038bc901f378cea0c305c6a

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

      Filesize

      7KB

      MD5

      23a832602f8e75f746031909173a9126

      SHA1

      a0b3fcd67dbea3c1b772de9028c5b03e7c5b19e8

      SHA256

      5576138d71d1fb54bb38ee227ac21617e5b5f42fadffc04346632abaf2d9eee2

      SHA512

      63e87ec3165de6b016eb84824f10f2c2d2373faa81ba500b85ed5d9304b00c6bcad79a81a7ed14ad36224bf80fe2376f52fee8190d2aaf8d5169d11bc488b899

    • \Device\HarddiskVolume1\GET_YOUR_FILES_BACK.txt

      Filesize

      1011B

      MD5

      c92c2b70fb37f84aab38412ad9226aa8

      SHA1

      14f2e9a83285612d0a7b2c83b8f89bccfde6c154

      SHA256

      d64639e873c0873b469cd856d1ef4bce7dc14a80fac6fe2bed9d629f05acc77f

      SHA512

      04f9dcb3cd49909712535255b6eadd7fafcb2902bf1abd5a25e9bb5f5c4dc032611aec0a5b0ec89cd7dbc65276b935c54b906b391507d2e3e3aa65466b15f848

    • \Users\Admin\AppData\Local\Temp\rufus-4.6p.exe

      Filesize

      1.5MB

      MD5

      8fe64da09af371b02a31828415ece8f3

      SHA1

      5b5c90dcd425c814b555a4567405601aa977ee0b

      SHA256

      8279696c1d78b14618500e9135886a3667b9decc65946f3729002e4bfdbb20ab

      SHA512

      e49f9b1c9d33364101ad2fd4f2c5ed030700cc941bb469cf2ce7d5b32c51cab9e62b265e05cbd92435453e7e4008c9990bea532298676f7d81e5d6dcdc2f590b

    • memory/1960-24577-0x000000013F780000-0x000000013FAB0000-memory.dmp

      Filesize

      3.2MB

    • memory/1960-24574-0x00000000007E0000-0x0000000000C4E000-memory.dmp

      Filesize

      4.4MB

    • memory/1960-9443-0x000000013F780000-0x000000013FAB0000-memory.dmp

      Filesize

      3.2MB

    • memory/2464-24576-0x000000013F7A0000-0x000000013FC0E000-memory.dmp

      Filesize

      4.4MB

    • memory/2464-24575-0x000000013F7A0000-0x000000013FC0E000-memory.dmp

      Filesize

      4.4MB

    • memory/3660-24573-0x0000000001F40000-0x0000000001F48000-memory.dmp

      Filesize

      32KB

    • memory/3660-24572-0x000000001B650000-0x000000001B932000-memory.dmp

      Filesize

      2.9MB

    • memory/4064-1300-0x0000000001C90000-0x0000000001C98000-memory.dmp

      Filesize

      32KB

    • memory/4064-1178-0x000000001B5D0000-0x000000001B8B2000-memory.dmp

      Filesize

      2.9MB