Analysis
-
max time kernel
0s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
05/01/2024, 05:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-01_5f8f53767c14d41c1f272b355b0db5a7_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-01_5f8f53767c14d41c1f272b355b0db5a7_cryptolocker.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-01_5f8f53767c14d41c1f272b355b0db5a7_cryptolocker.exe
-
Size
89KB
-
MD5
5f8f53767c14d41c1f272b355b0db5a7
-
SHA1
90a027a4b6dbf61585950fda21154343c5a945b5
-
SHA256
39a3fd0f035ce5b912ec029bfad7b0ac63dd2554024c473ccc882df6d6179c6c
-
SHA512
144d2d40c70fd808a27fd128dd519a18784672a35447ac3bb37c921fcf81a8dc541da1c0ddae4606ce97485b92b147217916a8a8766f82897c38c9289adf7c21
-
SSDEEP
1536:V6QFElP6n+gMQMOtEvwDpjQGYQbNcqamvWHShl/3S6:V6a+pOtEvwDpjtf
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1916 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1688 2024-01-01_5f8f53767c14d41c1f272b355b0db5a7_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1688 wrote to memory of 1916 1688 2024-01-01_5f8f53767c14d41c1f272b355b0db5a7_cryptolocker.exe 16 PID 1688 wrote to memory of 1916 1688 2024-01-01_5f8f53767c14d41c1f272b355b0db5a7_cryptolocker.exe 16 PID 1688 wrote to memory of 1916 1688 2024-01-01_5f8f53767c14d41c1f272b355b0db5a7_cryptolocker.exe 16 PID 1688 wrote to memory of 1916 1688 2024-01-01_5f8f53767c14d41c1f272b355b0db5a7_cryptolocker.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-01_5f8f53767c14d41c1f272b355b0db5a7_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-01_5f8f53767c14d41c1f272b355b0db5a7_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:1916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD5cd25d56af44a2d811ff0e8e4060711b8
SHA1e205ff8e7e479b01b67964717255f9f7371a2365
SHA256e46f4618839af08f6517636f023201f39cfcc78c0aa6460ee219d3d93f38b29e
SHA5126a74d5b0195e13c0908e851775b077cd35da14c41e66a0e7bcba27998a09686284a17cc20fe2c1e2dcbef7b1a899882b153deafc6808730edb22bb95ec5eb50d