S0640 Avaddon
Avaddon is ransomware written in C++ that has been offered as Ransomware-as-a-Service (RaaS) since at least June 2020.12
| Item | Value | 
|---|---|
| ID | S0640 | 
| Associated Names | |
| Type | MALWARE | 
| Version | 1.0 | 
| Created | 23 August 2021 | 
| Last Modified | 18 October 2021 | 
| Navigation Layer | View In ATT&CK® Navigator | 
Techniques Used
| Domain | ID | Name | Use | 
|---|---|---|---|
| enterprise | T1548 | Abuse Elevation Control Mechanism | - | 
| enterprise | T1548.002 | Bypass User Account Control | Avaddon bypasses UAC using the CMSTPLUA COM interface.2 | 
| enterprise | T1547 | Boot or Logon Autostart Execution | - | 
| enterprise | T1547.001 | Registry Run Keys / Startup Folder | Avaddon uses registry run keys for persistence.2 | 
| enterprise | T1059 | Command and Scripting Interpreter | - | 
| enterprise | T1059.007 | JavaScript | Avaddon has been executed through a malicious JScript downloader.31 | 
| enterprise | T1486 | Data Encrypted for Impact | Avaddon encrypts the victim system using a combination of AES256 and RSA encryption schemes.2 | 
| enterprise | T1140 | Deobfuscate/Decode Files or Information | Avaddon has decrypted encrypted strings.2 | 
| enterprise | T1083 | File and Directory Discovery | Avaddon has searched for specific files prior to encryption.2 | 
| enterprise | T1562 | Impair Defenses | - | 
| enterprise | T1562.001 | Disable or Modify Tools | Avaddon looks for and attempts to stop anti-malware solutions.2 | 
| enterprise | T1490 | Inhibit System Recovery | Avaddon deletes backups and shadow copies using native system tools.32 | 
| enterprise | T1112 | Modify Registry | Avaddon modifies several registry keys for persistence and UAC bypass.2 | 
| enterprise | T1106 | Native API | Avaddon has used the Windows Crypto API to generate an AES key.3 | 
| enterprise | T1135 | Network Share Discovery | Avaddon has enumerated shared folders and mapped volumes.2 | 
| enterprise | T1027 | Obfuscated Files or Information | Avaddon has used encrypted strings.2 | 
| enterprise | T1057 | Process Discovery | Avaddon has collected information about running processes.2 | 
| enterprise | T1489 | Service Stop | Avaddon looks for and attempts to stop database processes.2 | 
| enterprise | T1614 | System Location Discovery | - | 
| enterprise | T1614.001 | System Language Discovery | Avaddon checks for specific keyboard layouts and OS languages to avoid targeting Commonwealth of Independent States (CIS) entities.2 | 
| enterprise | T1016 | System Network Configuration Discovery | Avaddon can collect the external IP address of the victim.1 | 
| enterprise | T1047 | Windows Management Instrumentation | Avaddon uses wmic.exe to delete shadow copies.3 | 
References
- 
Gahlot, A. (n.d.). Threat Hunting for Avaddon Ransomware. Retrieved August 19, 2021. ↩↩↩
 - 
Yuste, J. Pastrana, S. (2021, February 9). Avaddon ransomware: an in-depth analysis and decryption of infected systems. Retrieved August 19, 2021. ↩↩↩↩↩↩↩↩↩↩↩↩↩↩
 - 
Security Lab. (2020, June 5). Avaddon: From seeking affiliates to in-the-wild in 2 days. Retrieved August 19, 2021. ↩↩↩↩