Analysis
-
max time kernel
146s -
max time network
170s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 15:14
Behavioral task
behavioral1
Sample
2024-01-03_3f4fb282f915209d441677cc7fcdaaec_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-03_3f4fb282f915209d441677cc7fcdaaec_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-03_3f4fb282f915209d441677cc7fcdaaec_cryptolocker.exe
-
Size
74KB
-
MD5
3f4fb282f915209d441677cc7fcdaaec
-
SHA1
6eace95ce0a72e6972a39af18d08fac1dd79fef9
-
SHA256
39ebec5e1fecc3a7b34e7c68473d59f137c3b78fd5f84ad3860bac4bee28bca0
-
SHA512
17bc457051bc8476edd2bb1aa8cd3032375aa03e6b0975d7afa49485546f55b2abdbe8db908332a158b713aa0b1412fa0fb86d66e7cc7db915c6869175d4e38a
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdnD:T6a+rdOOtEvwDpjNtF
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1300 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2096 2024-01-03_3f4fb282f915209d441677cc7fcdaaec_cryptolocker.exe -
resource yara_rule behavioral1/memory/2096-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x000c0000000122e9-11.dat upx behavioral1/memory/2096-15-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/1300-17-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/1300-25-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2096 wrote to memory of 1300 2096 2024-01-03_3f4fb282f915209d441677cc7fcdaaec_cryptolocker.exe 27 PID 2096 wrote to memory of 1300 2096 2024-01-03_3f4fb282f915209d441677cc7fcdaaec_cryptolocker.exe 27 PID 2096 wrote to memory of 1300 2096 2024-01-03_3f4fb282f915209d441677cc7fcdaaec_cryptolocker.exe 27 PID 2096 wrote to memory of 1300 2096 2024-01-03_3f4fb282f915209d441677cc7fcdaaec_cryptolocker.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-03_3f4fb282f915209d441677cc7fcdaaec_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-03_3f4fb282f915209d441677cc7fcdaaec_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:1300
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD51570ff11aacd05fdae85b7b7aab12527
SHA168fa8197b98bec8231440c648d5a195f916536a3
SHA2562f0a0ca65572f3323fb08fefa1e8f0cf4836980cee11480ef38e29915b12029a
SHA51285bd0ae4438fc6f5e9faee0fe7528b5d340b18a9db8bfb45226fc2f3d3000d15f5b5be7ed9b3ce8123752893567b4bb1a948de9032dd034765367cdc0509318d