Analysis
-
max time kernel
600s -
max time network
604s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
26-10-2022 22:28
Static task
static1
Behavioral task
behavioral1
Sample
a2bc3059283d7cc7bc574ce32cb6b8bfd27e02ac3810a21bd3a9b84c17f18a72.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a2bc3059283d7cc7bc574ce32cb6b8bfd27e02ac3810a21bd3a9b84c17f18a72.exe
Resource
win10v2004-20220812-en
General
-
Target
a2bc3059283d7cc7bc574ce32cb6b8bfd27e02ac3810a21bd3a9b84c17f18a72.exe
-
Size
692KB
-
MD5
bc11c93f1b6dc74bf4804a35b34d9267
-
SHA1
a18c25ed1282f56225d21c6460ffaaf16ae0d965
-
SHA256
a2bc3059283d7cc7bc574ce32cb6b8bfd27e02ac3810a21bd3a9b84c17f18a72
-
SHA512
c1e29195cd7ec50ae233318dcd149a6430fae3feb1f049c75083ee8879ea4733a09a985325d8448661d0c59a0a509ce9baaab174cb114d6ba2f908f63c819521
-
SSDEEP
12288:GebREpUV8gO1Axt4Kkp7vSCfnuf9Ooj0N:ZbepUV8gOit4KW79aOoQ
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Executes dropped EXE 2 IoCs
Processes:
{34184A33-0407-212E-3320-09040709E2C2}.exe{34184A33-0407-212E-3320-09040709E2C2}.exepid process 1764 {34184A33-0407-212E-3320-09040709E2C2}.exe 740 {34184A33-0407-212E-3320-09040709E2C2}.exe -
Deletes itself 1 IoCs
Processes:
{34184A33-0407-212E-3320-09040709E2C2}.exepid process 1764 {34184A33-0407-212E-3320-09040709E2C2}.exe -
Loads dropped DLL 2 IoCs
Processes:
a2bc3059283d7cc7bc574ce32cb6b8bfd27e02ac3810a21bd3a9b84c17f18a72.exepid process 1272 a2bc3059283d7cc7bc574ce32cb6b8bfd27e02ac3810a21bd3a9b84c17f18a72.exe 1272 a2bc3059283d7cc7bc574ce32cb6b8bfd27e02ac3810a21bd3a9b84c17f18a72.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
{34184A33-0407-212E-3320-09040709E2C2}.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run {34184A33-0407-212E-3320-09040709E2C2}.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Roaming\\{34184A33-0407-212E-3320-09040709E2C2}.exe" {34184A33-0407-212E-3320-09040709E2C2}.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
a2bc3059283d7cc7bc574ce32cb6b8bfd27e02ac3810a21bd3a9b84c17f18a72.exe{34184A33-0407-212E-3320-09040709E2C2}.exedescription pid process target process PID 1272 wrote to memory of 1764 1272 a2bc3059283d7cc7bc574ce32cb6b8bfd27e02ac3810a21bd3a9b84c17f18a72.exe {34184A33-0407-212E-3320-09040709E2C2}.exe PID 1272 wrote to memory of 1764 1272 a2bc3059283d7cc7bc574ce32cb6b8bfd27e02ac3810a21bd3a9b84c17f18a72.exe {34184A33-0407-212E-3320-09040709E2C2}.exe PID 1272 wrote to memory of 1764 1272 a2bc3059283d7cc7bc574ce32cb6b8bfd27e02ac3810a21bd3a9b84c17f18a72.exe {34184A33-0407-212E-3320-09040709E2C2}.exe PID 1272 wrote to memory of 1764 1272 a2bc3059283d7cc7bc574ce32cb6b8bfd27e02ac3810a21bd3a9b84c17f18a72.exe {34184A33-0407-212E-3320-09040709E2C2}.exe PID 1764 wrote to memory of 740 1764 {34184A33-0407-212E-3320-09040709E2C2}.exe {34184A33-0407-212E-3320-09040709E2C2}.exe PID 1764 wrote to memory of 740 1764 {34184A33-0407-212E-3320-09040709E2C2}.exe {34184A33-0407-212E-3320-09040709E2C2}.exe PID 1764 wrote to memory of 740 1764 {34184A33-0407-212E-3320-09040709E2C2}.exe {34184A33-0407-212E-3320-09040709E2C2}.exe PID 1764 wrote to memory of 740 1764 {34184A33-0407-212E-3320-09040709E2C2}.exe {34184A33-0407-212E-3320-09040709E2C2}.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2bc3059283d7cc7bc574ce32cb6b8bfd27e02ac3810a21bd3a9b84c17f18a72.exe"C:\Users\Admin\AppData\Local\Temp\a2bc3059283d7cc7bc574ce32cb6b8bfd27e02ac3810a21bd3a9b84c17f18a72.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" "/rC:\Users\Admin\AppData\Local\Temp\a2bc3059283d7cc7bc574ce32cb6b8bfd27e02ac3810a21bd3a9b84c17f18a72.exe"2⤵
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" /w000000C83⤵
- Executes dropped EXE
PID:740
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
692KB
MD5bc11c93f1b6dc74bf4804a35b34d9267
SHA1a18c25ed1282f56225d21c6460ffaaf16ae0d965
SHA256a2bc3059283d7cc7bc574ce32cb6b8bfd27e02ac3810a21bd3a9b84c17f18a72
SHA512c1e29195cd7ec50ae233318dcd149a6430fae3feb1f049c75083ee8879ea4733a09a985325d8448661d0c59a0a509ce9baaab174cb114d6ba2f908f63c819521
-
Filesize
692KB
MD5bc11c93f1b6dc74bf4804a35b34d9267
SHA1a18c25ed1282f56225d21c6460ffaaf16ae0d965
SHA256a2bc3059283d7cc7bc574ce32cb6b8bfd27e02ac3810a21bd3a9b84c17f18a72
SHA512c1e29195cd7ec50ae233318dcd149a6430fae3feb1f049c75083ee8879ea4733a09a985325d8448661d0c59a0a509ce9baaab174cb114d6ba2f908f63c819521
-
Filesize
692KB
MD5bc11c93f1b6dc74bf4804a35b34d9267
SHA1a18c25ed1282f56225d21c6460ffaaf16ae0d965
SHA256a2bc3059283d7cc7bc574ce32cb6b8bfd27e02ac3810a21bd3a9b84c17f18a72
SHA512c1e29195cd7ec50ae233318dcd149a6430fae3feb1f049c75083ee8879ea4733a09a985325d8448661d0c59a0a509ce9baaab174cb114d6ba2f908f63c819521
-
Filesize
692KB
MD5bc11c93f1b6dc74bf4804a35b34d9267
SHA1a18c25ed1282f56225d21c6460ffaaf16ae0d965
SHA256a2bc3059283d7cc7bc574ce32cb6b8bfd27e02ac3810a21bd3a9b84c17f18a72
SHA512c1e29195cd7ec50ae233318dcd149a6430fae3feb1f049c75083ee8879ea4733a09a985325d8448661d0c59a0a509ce9baaab174cb114d6ba2f908f63c819521
-
Filesize
692KB
MD5bc11c93f1b6dc74bf4804a35b34d9267
SHA1a18c25ed1282f56225d21c6460ffaaf16ae0d965
SHA256a2bc3059283d7cc7bc574ce32cb6b8bfd27e02ac3810a21bd3a9b84c17f18a72
SHA512c1e29195cd7ec50ae233318dcd149a6430fae3feb1f049c75083ee8879ea4733a09a985325d8448661d0c59a0a509ce9baaab174cb114d6ba2f908f63c819521