Analysis
-
max time kernel
172s -
max time network
181s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
19-11-2022 09:47
Static task
static1
Behavioral task
behavioral1
Sample
001b7a11497faa75fd8b490b03d99152ef9779606028a421b7760415da27ca5d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
001b7a11497faa75fd8b490b03d99152ef9779606028a421b7760415da27ca5d.exe
Resource
win10v2004-20220812-en
General
-
Target
001b7a11497faa75fd8b490b03d99152ef9779606028a421b7760415da27ca5d.exe
-
Size
519KB
-
MD5
3655ea01660a35a03f33b064caff5079
-
SHA1
4dbb86e2b954106a3e7fec387039d8fbee49525d
-
SHA256
001b7a11497faa75fd8b490b03d99152ef9779606028a421b7760415da27ca5d
-
SHA512
398d28681fb149f164677e0cb0a08c331716f4799b7909fdab0dcdadd27b798d78d7c5abd1788b9f79140735f0a15d4a963a3719a75d4dfa6ac233ea0538284d
-
SSDEEP
12288:X1NyA4TV5nMEv2C0Ae+9kPv3vNEejphL7ELecctvU7QSP73M7bqPG:veTV5nMf+xAyej/L74oQX3MgG
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Executes dropped EXE 3 IoCs
Processes:
{71257279-042b-371d-a1d3-fbf8d2fadffa}.exe{34184A33-0407-212E-3320-09040709E2C2}.exe{34184A33-0407-212E-3320-09040709E2C2}.exepid process 320 {71257279-042b-371d-a1d3-fbf8d2fadffa}.exe 1048 {34184A33-0407-212E-3320-09040709E2C2}.exe 2004 {34184A33-0407-212E-3320-09040709E2C2}.exe -
Loads dropped DLL 2 IoCs
Processes:
001b7a11497faa75fd8b490b03d99152ef9779606028a421b7760415da27ca5d.exe{71257279-042b-371d-a1d3-fbf8d2fadffa}.exepid process 1872 001b7a11497faa75fd8b490b03d99152ef9779606028a421b7760415da27ca5d.exe 320 {71257279-042b-371d-a1d3-fbf8d2fadffa}.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
{34184A33-0407-212E-3320-09040709E2C2}.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run {34184A33-0407-212E-3320-09040709E2C2}.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Roaming\\{34184A33-0407-212E-3320-09040709E2C2}.exe" {34184A33-0407-212E-3320-09040709E2C2}.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 1168 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
AcroRd32.exepid process 1168 AcroRd32.exe 1168 AcroRd32.exe 1168 AcroRd32.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
001b7a11497faa75fd8b490b03d99152ef9779606028a421b7760415da27ca5d.exe{71257279-042b-371d-a1d3-fbf8d2fadffa}.exe{34184A33-0407-212E-3320-09040709E2C2}.exedescription pid process target process PID 1872 wrote to memory of 320 1872 001b7a11497faa75fd8b490b03d99152ef9779606028a421b7760415da27ca5d.exe {71257279-042b-371d-a1d3-fbf8d2fadffa}.exe PID 1872 wrote to memory of 320 1872 001b7a11497faa75fd8b490b03d99152ef9779606028a421b7760415da27ca5d.exe {71257279-042b-371d-a1d3-fbf8d2fadffa}.exe PID 1872 wrote to memory of 320 1872 001b7a11497faa75fd8b490b03d99152ef9779606028a421b7760415da27ca5d.exe {71257279-042b-371d-a1d3-fbf8d2fadffa}.exe PID 1872 wrote to memory of 320 1872 001b7a11497faa75fd8b490b03d99152ef9779606028a421b7760415da27ca5d.exe {71257279-042b-371d-a1d3-fbf8d2fadffa}.exe PID 1872 wrote to memory of 1168 1872 001b7a11497faa75fd8b490b03d99152ef9779606028a421b7760415da27ca5d.exe AcroRd32.exe PID 1872 wrote to memory of 1168 1872 001b7a11497faa75fd8b490b03d99152ef9779606028a421b7760415da27ca5d.exe AcroRd32.exe PID 1872 wrote to memory of 1168 1872 001b7a11497faa75fd8b490b03d99152ef9779606028a421b7760415da27ca5d.exe AcroRd32.exe PID 1872 wrote to memory of 1168 1872 001b7a11497faa75fd8b490b03d99152ef9779606028a421b7760415da27ca5d.exe AcroRd32.exe PID 320 wrote to memory of 1048 320 {71257279-042b-371d-a1d3-fbf8d2fadffa}.exe {34184A33-0407-212E-3320-09040709E2C2}.exe PID 320 wrote to memory of 1048 320 {71257279-042b-371d-a1d3-fbf8d2fadffa}.exe {34184A33-0407-212E-3320-09040709E2C2}.exe PID 320 wrote to memory of 1048 320 {71257279-042b-371d-a1d3-fbf8d2fadffa}.exe {34184A33-0407-212E-3320-09040709E2C2}.exe PID 320 wrote to memory of 1048 320 {71257279-042b-371d-a1d3-fbf8d2fadffa}.exe {34184A33-0407-212E-3320-09040709E2C2}.exe PID 1048 wrote to memory of 2004 1048 {34184A33-0407-212E-3320-09040709E2C2}.exe {34184A33-0407-212E-3320-09040709E2C2}.exe PID 1048 wrote to memory of 2004 1048 {34184A33-0407-212E-3320-09040709E2C2}.exe {34184A33-0407-212E-3320-09040709E2C2}.exe PID 1048 wrote to memory of 2004 1048 {34184A33-0407-212E-3320-09040709E2C2}.exe {34184A33-0407-212E-3320-09040709E2C2}.exe PID 1048 wrote to memory of 2004 1048 {34184A33-0407-212E-3320-09040709E2C2}.exe {34184A33-0407-212E-3320-09040709E2C2}.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\001b7a11497faa75fd8b490b03d99152ef9779606028a421b7760415da27ca5d.exe"C:\Users\Admin\AppData\Local\Temp\001b7a11497faa75fd8b490b03d99152ef9779606028a421b7760415da27ca5d.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\{71257279-042b-371d-a1d3-fbf8d2fadffa}.exe"C:\Users\Admin\AppData\Local\Temp\{71257279-042b-371d-a1d3-fbf8d2fadffa}.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" "/rC:\Users\Admin\AppData\Local\Temp\{71257279-042b-371d-a1d3-fbf8d2fadffa}.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" /w000000C84⤵
- Executes dropped EXE
PID:2004
-
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Email.pdf"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1168
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14B
MD541e86c2b6c58b19f23c528e49b0cccd3
SHA1151e373b7e9e7db55c51ef6e1576f7fc1945dd88
SHA2561f21a2b7f1ed54c31749d69eef98c317ab3ad4f6c5f8701b021c6fa04ea2f2f6
SHA512d75642888b27357f12a86352ba2593a91dcc72b6d9ede4f4d0b3420fa53f734176b0046edb6be8832c6a8f7d6fbf5f2dc97cc2ca578b28ae1d18190cb921258b
-
Filesize
336KB
MD513b25d5795762b82e30501f116ca736e
SHA1a80835acfcf8542765223357546cce2ad9a406ce
SHA25686f4fac36bc44b5accc435614bb8ad535ab815c0002925406e395bbbbe448930
SHA51200743d35ac8fd2af092d610aa27b691620bb415bb39f66b74ba4bb7dde5ffd32a4a79ad3cb4f4d263f79cd2c53a4152639c6763fa447da4ca2a08da30c528aba
-
Filesize
336KB
MD513b25d5795762b82e30501f116ca736e
SHA1a80835acfcf8542765223357546cce2ad9a406ce
SHA25686f4fac36bc44b5accc435614bb8ad535ab815c0002925406e395bbbbe448930
SHA51200743d35ac8fd2af092d610aa27b691620bb415bb39f66b74ba4bb7dde5ffd32a4a79ad3cb4f4d263f79cd2c53a4152639c6763fa447da4ca2a08da30c528aba
-
Filesize
336KB
MD513b25d5795762b82e30501f116ca736e
SHA1a80835acfcf8542765223357546cce2ad9a406ce
SHA25686f4fac36bc44b5accc435614bb8ad535ab815c0002925406e395bbbbe448930
SHA51200743d35ac8fd2af092d610aa27b691620bb415bb39f66b74ba4bb7dde5ffd32a4a79ad3cb4f4d263f79cd2c53a4152639c6763fa447da4ca2a08da30c528aba
-
Filesize
336KB
MD513b25d5795762b82e30501f116ca736e
SHA1a80835acfcf8542765223357546cce2ad9a406ce
SHA25686f4fac36bc44b5accc435614bb8ad535ab815c0002925406e395bbbbe448930
SHA51200743d35ac8fd2af092d610aa27b691620bb415bb39f66b74ba4bb7dde5ffd32a4a79ad3cb4f4d263f79cd2c53a4152639c6763fa447da4ca2a08da30c528aba
-
Filesize
336KB
MD513b25d5795762b82e30501f116ca736e
SHA1a80835acfcf8542765223357546cce2ad9a406ce
SHA25686f4fac36bc44b5accc435614bb8ad535ab815c0002925406e395bbbbe448930
SHA51200743d35ac8fd2af092d610aa27b691620bb415bb39f66b74ba4bb7dde5ffd32a4a79ad3cb4f4d263f79cd2c53a4152639c6763fa447da4ca2a08da30c528aba
-
Filesize
336KB
MD513b25d5795762b82e30501f116ca736e
SHA1a80835acfcf8542765223357546cce2ad9a406ce
SHA25686f4fac36bc44b5accc435614bb8ad535ab815c0002925406e395bbbbe448930
SHA51200743d35ac8fd2af092d610aa27b691620bb415bb39f66b74ba4bb7dde5ffd32a4a79ad3cb4f4d263f79cd2c53a4152639c6763fa447da4ca2a08da30c528aba