Analysis
-
max time kernel
3s -
max time network
172s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
05/01/2024, 05:37
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-01_0e5f426219c1c072fbf8be018cb6f9a5_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-01_0e5f426219c1c072fbf8be018cb6f9a5_cryptolocker.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-01_0e5f426219c1c072fbf8be018cb6f9a5_cryptolocker.exe
-
Size
43KB
-
MD5
0e5f426219c1c072fbf8be018cb6f9a5
-
SHA1
3533b9662ff36329f5a0e703696f948c70adf6dc
-
SHA256
e2753266d0635d17fc3280c156a741aed1db60753426b3d0282f33a818223367
-
SHA512
2f455aa47aed04a56021ea87ed7ed66737cfed1db50e4174b65843e55318f72e6b324949712062639435d4d5ab3746107fc974564d5bf41b2c4f0c519df20c99
-
SSDEEP
768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpj/MLaHaMMm2X30D:V6QFElP6n+gMQMOtEvwDpjyaHaXy
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2716 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2836 2024-01-01_0e5f426219c1c072fbf8be018cb6f9a5_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2836 wrote to memory of 2716 2836 2024-01-01_0e5f426219c1c072fbf8be018cb6f9a5_cryptolocker.exe 19 PID 2836 wrote to memory of 2716 2836 2024-01-01_0e5f426219c1c072fbf8be018cb6f9a5_cryptolocker.exe 19 PID 2836 wrote to memory of 2716 2836 2024-01-01_0e5f426219c1c072fbf8be018cb6f9a5_cryptolocker.exe 19 PID 2836 wrote to memory of 2716 2836 2024-01-01_0e5f426219c1c072fbf8be018cb6f9a5_cryptolocker.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-01_0e5f426219c1c072fbf8be018cb6f9a5_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-01_0e5f426219c1c072fbf8be018cb6f9a5_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2716
-