SOC145 โ Ransomware Detected (Avaddon Ransomware Infection)
by
๐ง Summary
This investigation was triggered by a SOC145 โ Ransomware Detected alert involving a suspicious executable named ab.exe.
Initial threat intelligence analysis using VirusTotal revealed a high detection rate (62/72), strongly indicating malicious activity.
Further dynamic analysis using AnyRun sandbox confirmed ransomware behavior, including execution of WMIC commands to delete shadow copies, a known technique used by ransomware to prevent recovery.
Additional validation using Joe Sandbox identified the malware as part of the Avaddon ransomware family, associated with the RIDDLE SPIDER threat group.
The affected host was immediately contained, and the alert was classified as a True Positive ransomware infection.
๐จ Alert Overview
- Event ID: 92
- Rule: SOC145 โ Ransomware Detected
- Severity: Critical
- Source Host: MarkPRD
- Source IP: 172.16.17.88
- File Name: ab.exe
- File Hash (MD5):
0b486fe0503524cfe4726a4022fa6a68 - File Size: 775.50 KB
- Action: Allowed
๐ฅ๏ธ Endpoint Information
- Hostname: MarkPRD
- Operating System: Windows 10 (64-bit)
- User Activity: File download and execution
๐ Initial Findings
- Suspicious executable detected on endpoint
- File execution allowed by system
- High severity alert triggered
โ ๏ธ Immediate deep-dive investigation required due to ransomware risk.
๐งช Threat Intelligence โ File Analysis
๐ VirusTotal (File Hash)

| Result | Value |
|---|---|
| Detection Ratio | 62 / 72 |
| Verdict | Malicious |
๐งฌ Threat Classification
- Malware Type: Ransomware
- Family: Avaddon
- Associated Labels: Trojan, Ransomware
๐ง Interpretation
- Extremely high detection rate โ confirmed malware
- Multiple vendors classify it as Avaddon ransomware
๐งฌ Dynamic Analysis (AnyRun Sandbox)

๐ Observations
- File executed as
ab.bin.exe - Multiple suspicious child processes spawned
- Use of WMIC commands
๐จ Critical Behavior Detected
WMIC.exe SHADOWCOPY DELETE /nointeractive
๐ง Analysis
- This command deletes volume shadow copies
- Prevents victim from restoring files
- Strong indicator of ransomware behavior
๐ Process Behavior Analysis

๐ Key Findings
- Parent process:
ab.bin.exe - Child processes:
WMIC.execonhost.exevssvc.exe
๐ง Interpretation
- Process chain indicates:
- Execution
- System modification
- Defense evasion
๐งช Threat Intelligence โ Malware Family

๐ Joe Sandbox Findings
| Attribute | Value |
|---|---|
| Malware Family | Avaddon |
| Threat Type | Ransomware |
| Attribution | RIDDLE SPIDER |
๐ง Intelligence Insight
- Avaddon ransomware:
- Encrypts files with
.avdnextension - Uses TOR-based ransom payment portals
- Commonly distributed via phishing or malware loaders
- Encrypts files with
๐ Behavioral Indicators
| Indicator | Status |
|---|---|
| Malicious File Execution | โ Confirmed |
| Shadow Copy Deletion | โ Confirmed |
| Ransomware Behavior | โ Confirmed |
| Known Malicious Hash | โ Confirmed |
| Sandbox Malicious Activity | โ Confirmed |
๐งพ Investigation Steps
- Reviewed alert metadata and file details
- Analyzed file hash in VirusTotal
- Observed high detection ratio (62/72)
- Executed file in AnyRun sandbox
- Identified ransomware behavior (shadow copy deletion)
- Analyzed process tree and system activity
- Verified malware family using Joe Sandbox
- Correlated all threat intelligence data
- Confirmed ransomware infection
- Contained affected endpoint
๐จ Incident Response Actions
- โ Host isolated / contained
- โ Malicious file identified and analyzed
- โ Ransomware behavior confirmed
- โ Threat intelligence correlation completed
- โ Evidence preserved for forensic investigation
๐งฌ MITRE ATT&CK Mapping
| Tactic | Technique | Description |
|---|---|---|
| Execution | T1204.002 โ User Execution | User executed malicious file |
| Defense Evasion | T1070.004 โ File Deletion | Shadow copies deleted |
| Impact | T1486 โ Data Encrypted for Impact | Ransomware encryption |
| Discovery | T1082 โ System Information Discovery | System info gathering |
| Command & Control | T1071.001 โ Web Protocols | Potential C2 communication |
๐ Final Verdict
| Category | Result |
|---|---|
| Malware Presence | Confirmed |
| Threat Type | Avaddon Ransomware |
| Initial Vector | Malicious File Execution |
| Host Compromise | Confirmed |
| Alert Classification | True Positive |
| Incident Severity | Critical |
๐ Conclusion
This alert represents a confirmed ransomware infection involving Avaddon malware.
Key evidence includes:
- High-confidence VirusTotal detections
- Ransomware behavior in sandbox (shadow copy deletion)
- Confirmed malware family via Joe Sandbox
The malware demonstrated classic ransomware techniques, including:
- Execution of malicious payload
- Disabling recovery mechanisms
- Preparing system for file encryption
Immediate containment was required to prevent:
- Data encryption
- System damage
- Lateral movement
tags: