Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
62s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23/03/2025, 03:27
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe
-
Size
807KB
-
MD5
528d138f078aea724b85f07e4c4a3670
-
SHA1
3428fcec32a3820febe48efb2f65517819f82476
-
SHA256
9b541fcef44f395d8fe3da9c6f4afb95dc25d33082e58d2e2541c418ee8b8d07
-
SHA512
cc668f9d59756270fa1f52419dc0c2b39650d559b00e6fec9ffb3871697c039ccc8ba474e89db3ae4587b3d328e282cca6c3bc43d75c8ffafab8ab0143c3a6b4
-
SSDEEP
12288:0Z4s3rg9u/2/oT+NXtHLlP/O+OeO+OeNhBBhhBBAtHg9rjI+LXJ0ivlzkHBDsYAU:u4s+oT+NXBLi0rjFXvyHBlShCZa8
Malware Config
Signatures
-
Avoslocker Ransomware
Avoslocker is a relatively new ransomware, that was observed in late June and early July, 2021.
-
Avoslocker family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 1668 bcdedit.exe 3368 bcdedit.exe -
Renames multiple (10016) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBBA\MSPUB8.BDR 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FieldTypePreview\DATE.JPG 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File created C:\Program Files (x86)\Common Files\System\MSMAPI\1033\GET_YOUR_FILES_BACK.txt 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File created C:\Program Files\Microsoft Games\Chess\ja-JP\GET_YOUR_FILES_BACK.txt 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-applemenu_ja.jar 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.touchpoint.natives_1.1.100.v20140523-0116.jar 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Magadan 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\jdwpTransport.h 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18209_.WMF 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\es-ES\GET_YOUR_FILES_BACK.txt 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\GET_YOUR_FILES_BACK.txt 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\GET_YOUR_FILES_BACK.txt 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File created C:\Program Files\Windows Sidebar\de-DE\GET_YOUR_FILES_BACK.txt 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Enderbury 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\GET_YOUR_FILES_BACK.txt 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\Things\WHOOSH.WAV 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-application-views.xml 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Vancouver 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\access-bridge-64.jar 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\images\play_rest.png 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\ACCSBAR.POC 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.COM.VN.XML 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Biscay\TAB_ON.GIF 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\sql70.xsl 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Hong_Kong 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Tbilisi 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\ct.sym 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_box_right.png 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD00419_.WMF 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SL00452_.WMF 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\TTS20\en-US\enu-dsk\M1033DSK.CRT 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT+2 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\6.png 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PROFILE\THMBNAIL.PNG 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RADIAL\RADIAL.ELM 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\css\GET_YOUR_FILES_BACK.txt 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL065.XML 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_gray_few-showers.png 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Iqaluit 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\bear_formatted_matte2.wmv 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\GET_YOUR_FILES_BACK.txt 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\en-US\js\library.js 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\utilityfunctions.js 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105414.WMF 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0382970.JPG 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_gray_rainy.png 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL075.XML 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\J0143749.GIF 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\WB02055_.GIF 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BOATINST.WMF 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\it-IT\GET_YOUR_FILES_BACK.txt 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Windows Journal\en-US\jnwmon.dll.mui 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Bangkok 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\images\activity16v.png 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\ContentDirectory.xml 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\fonts\LucidaSansDemiBold.ttf 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\css\weather.css 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\SEAMARBL.JPG 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0196358.WMF 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Jamaica 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File created C:\Program Files\Common Files\System\msadc\ja-JP\GET_YOUR_FILES_BACK.txt 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Windows Media Player\fr-FR\setup_wm.exe.mui 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107722.WMF 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Riyadh88 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe -
pid Process 3348 powershell.exe 3524 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1736 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2484 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe 3348 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2484 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe Token: SeIncreaseQuotaPrivilege 3328 WMIC.exe Token: SeSecurityPrivilege 3328 WMIC.exe Token: SeTakeOwnershipPrivilege 3328 WMIC.exe Token: SeLoadDriverPrivilege 3328 WMIC.exe Token: SeSystemProfilePrivilege 3328 WMIC.exe Token: SeSystemtimePrivilege 3328 WMIC.exe Token: SeProfSingleProcessPrivilege 3328 WMIC.exe Token: SeIncBasePriorityPrivilege 3328 WMIC.exe Token: SeCreatePagefilePrivilege 3328 WMIC.exe Token: SeBackupPrivilege 3328 WMIC.exe Token: SeRestorePrivilege 3328 WMIC.exe Token: SeShutdownPrivilege 3328 WMIC.exe Token: SeDebugPrivilege 3328 WMIC.exe Token: SeSystemEnvironmentPrivilege 3328 WMIC.exe Token: SeRemoteShutdownPrivilege 3328 WMIC.exe Token: SeUndockPrivilege 3328 WMIC.exe Token: SeManageVolumePrivilege 3328 WMIC.exe Token: 33 3328 WMIC.exe Token: 34 3328 WMIC.exe Token: 35 3328 WMIC.exe Token: SeBackupPrivilege 3964 vssvc.exe Token: SeRestorePrivilege 3964 vssvc.exe Token: SeAuditPrivilege 3964 vssvc.exe Token: SeIncreaseQuotaPrivilege 3328 WMIC.exe Token: SeSecurityPrivilege 3328 WMIC.exe Token: SeTakeOwnershipPrivilege 3328 WMIC.exe Token: SeLoadDriverPrivilege 3328 WMIC.exe Token: SeSystemProfilePrivilege 3328 WMIC.exe Token: SeSystemtimePrivilege 3328 WMIC.exe Token: SeProfSingleProcessPrivilege 3328 WMIC.exe Token: SeIncBasePriorityPrivilege 3328 WMIC.exe Token: SeCreatePagefilePrivilege 3328 WMIC.exe Token: SeBackupPrivilege 3328 WMIC.exe Token: SeRestorePrivilege 3328 WMIC.exe Token: SeShutdownPrivilege 3328 WMIC.exe Token: SeDebugPrivilege 3328 WMIC.exe Token: SeSystemEnvironmentPrivilege 3328 WMIC.exe Token: SeRemoteShutdownPrivilege 3328 WMIC.exe Token: SeUndockPrivilege 3328 WMIC.exe Token: SeManageVolumePrivilege 3328 WMIC.exe Token: 33 3328 WMIC.exe Token: 34 3328 WMIC.exe Token: 35 3328 WMIC.exe Token: SeDebugPrivilege 3348 powershell.exe Token: SeBackupPrivilege 3348 powershell.exe Token: SeSecurityPrivilege 3348 powershell.exe Token: SeBackupPrivilege 3348 powershell.exe Token: SeBackupPrivilege 3348 powershell.exe Token: SeSecurityPrivilege 3348 powershell.exe Token: SeBackupPrivilege 3348 powershell.exe Token: SeBackupPrivilege 3348 powershell.exe Token: SeSecurityPrivilege 3348 powershell.exe Token: SeBackupPrivilege 3348 powershell.exe Token: SeBackupPrivilege 3348 powershell.exe Token: SeSecurityPrivilege 3348 powershell.exe Token: SeBackupPrivilege 3348 powershell.exe Token: SeBackupPrivilege 3348 powershell.exe Token: SeSecurityPrivilege 3348 powershell.exe Token: SeBackupPrivilege 3348 powershell.exe Token: SeBackupPrivilege 3348 powershell.exe Token: SeSecurityPrivilege 3348 powershell.exe Token: SeBackupPrivilege 3348 powershell.exe Token: SeSecurityPrivilege 3348 powershell.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 2484 wrote to memory of 2828 2484 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe 31 PID 2484 wrote to memory of 2828 2484 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe 31 PID 2484 wrote to memory of 2828 2484 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe 31 PID 2484 wrote to memory of 2828 2484 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe 31 PID 2484 wrote to memory of 2844 2484 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe 32 PID 2484 wrote to memory of 2844 2484 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe 32 PID 2484 wrote to memory of 2844 2484 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe 32 PID 2484 wrote to memory of 2844 2484 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe 32 PID 2484 wrote to memory of 2892 2484 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe 33 PID 2484 wrote to memory of 2892 2484 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe 33 PID 2484 wrote to memory of 2892 2484 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe 33 PID 2484 wrote to memory of 2892 2484 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe 33 PID 2484 wrote to memory of 3020 2484 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe 34 PID 2484 wrote to memory of 3020 2484 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe 34 PID 2484 wrote to memory of 3020 2484 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe 34 PID 2484 wrote to memory of 3020 2484 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe 34 PID 2484 wrote to memory of 2820 2484 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe 35 PID 2484 wrote to memory of 2820 2484 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe 35 PID 2484 wrote to memory of 2820 2484 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe 35 PID 2484 wrote to memory of 2820 2484 2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe 35 PID 3020 wrote to memory of 1668 3020 cmd.exe 36 PID 3020 wrote to memory of 1668 3020 cmd.exe 36 PID 3020 wrote to memory of 1668 3020 cmd.exe 36 PID 2844 wrote to memory of 1736 2844 cmd.exe 37 PID 2844 wrote to memory of 1736 2844 cmd.exe 37 PID 2844 wrote to memory of 1736 2844 cmd.exe 37 PID 2828 wrote to memory of 3328 2828 cmd.exe 38 PID 2828 wrote to memory of 3328 2828 cmd.exe 38 PID 2828 wrote to memory of 3328 2828 cmd.exe 38 PID 2820 wrote to memory of 3348 2820 cmd.exe 39 PID 2820 wrote to memory of 3348 2820 cmd.exe 39 PID 2820 wrote to memory of 3348 2820 cmd.exe 39 PID 2892 wrote to memory of 3368 2892 cmd.exe 40 PID 2892 wrote to memory of 3368 2892 cmd.exe 40 PID 2892 wrote to memory of 3368 2892 cmd.exe 40 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-23_528d138f078aea724b85f07e4c4a3670_avoslocker_cobalt-strike_luca-stealer.exe"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\system32\cmd.execmd /c wmic shadowcopy delete /nointeractive2⤵
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3328
-
-
-
C:\Windows\system32\cmd.execmd /c vssadmin.exe Delete Shadows /All /Quiet2⤵
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:1736
-
-
-
C:\Windows\system32\cmd.execmd /c bcdedit /set {default} recoveryenabled No2⤵
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:3368
-
-
-
C:\Windows\system32\cmd.execmd /c bcdedit /set {default} bootstatuspolicy ignoreallfailures2⤵
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵
- Modifies boot configuration data using bcdedit
PID:1668
-
-
-
C:\Windows\system32\cmd.execmd /c powershell -command "Get-EventLog -LogName * | ForEach { Clear-EventLog $_.Log }"2⤵
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "Get-EventLog -LogName * | ForEach { Clear-EventLog $_.Log }"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3348
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$a = [System.IO.File]::ReadAllText(\"C:\GET_YOUR_FILES_BACK.txt\");Add-Type -AssemblyName System.Drawing;$filename = \"$env:temp\$(Get-Random).png\";$bmp = new-object System.Drawing.Bitmap 1920,1080;$font = new-object System.Drawing.Font Consolas,10;$brushBg = [System.Drawing.Brushes]::Black;$brushFg = [System.Drawing.Brushes]::White;$format = [System.Drawing.StringFormat]::GenericDefault;$format.Alignment = [System.Drawing.StringAlignment]::Center;$format.LineAlignment = [System.Drawing.StringAlignment]::Center;$graphics = [System.Drawing.Graphics]::FromImage($bmp);$graphics.FillRectangle($brushBg,0,0,$bmp.Width,$bmp.Height);$graphics.DrawString($a,$font,$brushFg,[System.Drawing.RectangleF]::FromLTRB(0, 0, 1920, 1080),$format);$graphics.Dispose();$bmp.Save($filename);reg add \"HKEY_CURRENT_USER\Control Panel\Desktop\" /v Wallpaper /t REG_SZ /d $filename /f;Start-Sleep 1;rundll32.exe user32.dll, UpdatePerUserSystemParameters, 0, $false;"2⤵
- Command and Scripting Interpreter: PowerShell
PID:3524 -
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add "HKEY_CURRENT_USER\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\512470939.png /f3⤵PID:3724
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" user32.dll UpdatePerUserSystemParameters 0 False3⤵PID:5056
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1011B
MD5637ac40e5c4b5fe7616dd5edbe980dfa
SHA1e466c822d11ed34e98b4fae2efe84fec59f2214a
SHA2561ae59ffa34e3f81e8df4d9bb875eb868c5405eaf12e379b9b80f48299b57a3b4
SHA51284b1694c07c1cf83aceea2b57af23f72c060f36bf2a8b0126758b97ef10f433dba4c97abdaf48180bbb57e47af751491bf37726dbf23616206976f63ba4727b3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD570c34bd80f630291392b5b914641ac6a
SHA1e507e084d0607cf9769f19a245e8009ed3281633
SHA2567aee31999f3270478a489c46f813406e845cd4ad3c7ed8beeb864a9e5fcdc786
SHA5128bf07d6d79a2e2085ca81afaecf65bb50e6227996853186a7db737c062f963517c7fc71e8abaeba38e7c7b3c866c388ce7fa7cf9ebabe0119002d7a313457619