Analysis

  • max time kernel
    95s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-01-2025 04:47

General

  • Target

    JaffaCakes118_f75e92b4cf12745c63966bb50c82e4be.exe

  • Size

    921KB

  • MD5

    f75e92b4cf12745c63966bb50c82e4be

  • SHA1

    e58678781548262b653b34bbf3f55339d53f28cb

  • SHA256

    a1b504b8e34200d8029f6d75491d517e460162cb9df438257ee4ed85f61c18bc

  • SHA512

    2d66d1868e44956c00593d7d19d70b14475571dcd9b5eee9d15ac4fa3d473ce3a05c598c57ea31707b4deaa3469ed046b85f4e9c3f04430e652eda4d6a4f6038

  • SSDEEP

    24576:SnkXEg1ZlhKG+WWZtCpDCE5Ie534SCeTpOl13lHlI:SkXEg1ZlIzZtCpGE5j5oSHOlxRlI

Malware Config

Extracted

Path

F:\$RECYCLE.BIN\GET_YOUR_FILES_BACK.txt

Ransom Note
AvosLocker Attention! Your systems have been encrypted, and your confidential documents were downloaded. In order to restore your data, you must pay for the decryption key & application. You may do so by visiting us at http://avosjon4pfh3y7ew3jdwz6ofw7lljcxlbk7hcxxmnxlh5kvf2akcqjad.onion. This is an onion address that you may access using Tor Browser which you may download at https://www.torproject.org/download/ Details such as pricing, how long before the price increases and such will be available to you once you enter your ID presented to you below in this note in our website. Contact us soon, because those who don't have their data leaked in our press release blog and the price they'll have to pay will go up significantly. The corporations whom don't pay or fail to respond in a swift manner have their data leaked in our blog, accessible at http://avosqxh72b5ia23dl5fgwcpndkctuzqvh2iefk5imp3pi5gfhel5klad.onion Additional notes from attackers responsible: Hello, All your data in the company is encrypted and your important company data is backed up. I do not need money, I receive payments from many companies every day and I deal with the encryption of many companies every day. More important than money is time for me. For this reason, I have time to inflate the number and bargain like other friends who do this business. The offer I have made for your company is very reasonable and not a big deal for you. If you do not pay, the data of the company that we have backed up after 7 days will be shared publicly on the internet and you will not be able to recover any of your encrypted data. Your ID: 8c7a9b681dfa1b2b87ea459caddf2adf9413dc76664fb74063fb264116897023
URLs

http://avosjon4pfh3y7ew3jdwz6ofw7lljcxlbk7hcxxmnxlh5kvf2akcqjad.onion

http://avosqxh72b5ia23dl5fgwcpndkctuzqvh2iefk5imp3pi5gfhel5klad.onion

Signatures

  • Avoslocker Ransomware

    Avoslocker is a relatively new ransomware, that was observed in late June and early July, 2021.

  • Avoslocker family
  • Renames multiple (138) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f75e92b4cf12745c63966bb50c82e4be.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f75e92b4cf12745c63966bb50c82e4be.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:696
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command "$a = [System.IO.File]::ReadAllText(\"C:\GET_YOUR_FILES_BACK.txt\");Add-Type -AssemblyName System.Drawing;$filename = \"$env:temp\$(Get-Random).png\";$bmp = new-object System.Drawing.Bitmap 1920,1080;$font = new-object System.Drawing.Font Consolas,10;$brushBg = [System.Drawing.Brushes]::Black;$brushFg = [System.Drawing.Brushes]::White;$format = [System.Drawing.StringFormat]::GenericDefault;$format.Alignment = [System.Drawing.StringAlignment]::Center;$format.LineAlignment = [System.Drawing.StringAlignment]::Center;$graphics = [System.Drawing.Graphics]::FromImage($bmp);$graphics.FillRectangle($brushBg,0,0,$bmp.Width,$bmp.Height);$graphics.DrawString($a,$font,$brushFg,[System.Drawing.RectangleF]::FromLTRB(0, 0, 1920, 1080),$format);$graphics.Dispose();$bmp.Save($filename);reg add \"HKEY_CURRENT_USER\Control Panel\Desktop\" /v Wallpaper /t REG_SZ /d $filename /f;Start-Sleep 1;rundll32.exe user32.dll, UpdatePerUserSystemParameters, 0, $false;"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:6052
      • C:\Windows\SysWOW64\reg.exe
        "C:\Windows\system32\reg.exe" add "HKEY_CURRENT_USER\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\182577049.png /f
        3⤵
        • Sets desktop wallpaper using registry
        • System Location Discovery: System Language Discovery
        PID:2324
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\system32\rundll32.exe" user32.dll UpdatePerUserSystemParameters 0 False
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_gfjticct.z3m.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • F:\$RECYCLE.BIN\GET_YOUR_FILES_BACK.txt

    Filesize

    1KB

    MD5

    9cd17876488bd2c2b81b965620b9aa14

    SHA1

    f5305680ebd56c1eebc1797c6a7ce93117c3423c

    SHA256

    08152eb79c4f4b16badb06fe231da164570b62999357c8da8659e6d024f11127

    SHA512

    7eea1d69e706ef86c0d2343630bc3553b2d5418523d2e4aabcc66d1c0ea3754351ed4c0ab6c185eabbd313f5333d56182c0a9e873aa05b1c5e514e9a3dfceb8d

  • memory/6052-396-0x0000000005D90000-0x0000000005DF6000-memory.dmp

    Filesize

    408KB

  • memory/6052-390-0x0000000074B9E000-0x0000000074B9F000-memory.dmp

    Filesize

    4KB

  • memory/6052-392-0x0000000074B90000-0x0000000075340000-memory.dmp

    Filesize

    7.7MB

  • memory/6052-394-0x0000000074B90000-0x0000000075340000-memory.dmp

    Filesize

    7.7MB

  • memory/6052-395-0x0000000005CE0000-0x0000000005D02000-memory.dmp

    Filesize

    136KB

  • memory/6052-397-0x0000000005E70000-0x0000000005ED6000-memory.dmp

    Filesize

    408KB

  • memory/6052-391-0x0000000004EA0000-0x0000000004ED6000-memory.dmp

    Filesize

    216KB

  • memory/6052-393-0x0000000005510000-0x0000000005B38000-memory.dmp

    Filesize

    6.2MB

  • memory/6052-407-0x0000000005EE0000-0x0000000006234000-memory.dmp

    Filesize

    3.3MB

  • memory/6052-408-0x00000000064E0000-0x00000000064FE000-memory.dmp

    Filesize

    120KB

  • memory/6052-409-0x0000000006520000-0x000000000656C000-memory.dmp

    Filesize

    304KB

  • memory/6052-411-0x0000000007B60000-0x00000000081DA000-memory.dmp

    Filesize

    6.5MB

  • memory/6052-412-0x0000000006A30000-0x0000000006A4A000-memory.dmp

    Filesize

    104KB

  • memory/6052-413-0x0000000007950000-0x00000000079E2000-memory.dmp

    Filesize

    584KB

  • memory/6052-414-0x0000000074B90000-0x0000000075340000-memory.dmp

    Filesize

    7.7MB

  • memory/6052-418-0x0000000074B90000-0x0000000075340000-memory.dmp

    Filesize

    7.7MB