Analysis
-
max time kernel
0s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
05/01/2024, 05:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-01_7657472a6c77b3bc8b38eabc09292512_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-01_7657472a6c77b3bc8b38eabc09292512_cryptolocker.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-01_7657472a6c77b3bc8b38eabc09292512_cryptolocker.exe
-
Size
35KB
-
MD5
7657472a6c77b3bc8b38eabc09292512
-
SHA1
80877db0556f1dd14c29223f84348c5bac9db1c2
-
SHA256
1d913d40dbe0f477d351dcd85607927888a56d01dababcfed96d8d2c626243d9
-
SHA512
f5d3f35f62d70d81aaca804d947c3914e8944dd8c55cfcd2bcedf2e17e043e1cad53daa8c9f8d42ae6d6994734de1242c854a973cbc5d40b6e9935be296a7f30
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBVaD3TP7Dj:X6QFElP6n+gJQMOtEvwDpjBmzDj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2544 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2176 2024-01-01_7657472a6c77b3bc8b38eabc09292512_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2544 2176 2024-01-01_7657472a6c77b3bc8b38eabc09292512_cryptolocker.exe 15 PID 2176 wrote to memory of 2544 2176 2024-01-01_7657472a6c77b3bc8b38eabc09292512_cryptolocker.exe 15 PID 2176 wrote to memory of 2544 2176 2024-01-01_7657472a6c77b3bc8b38eabc09292512_cryptolocker.exe 15 PID 2176 wrote to memory of 2544 2176 2024-01-01_7657472a6c77b3bc8b38eabc09292512_cryptolocker.exe 15
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-01_7657472a6c77b3bc8b38eabc09292512_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-01_7657472a6c77b3bc8b38eabc09292512_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD5dbf03a180cbda57eaf3ff08ad4d0f3b0
SHA16e65c00abb7ae7c0692ccc9a63f3c4127ef9a1b9
SHA256c51ebc752af3cea3ffef31927bd162cd5729c33f0f14a7dd16b8700de8b92f9f
SHA51217d8fcfa40b17843cd3ae748d6e9756af8e2f623b4861fc4e520eec2a8faa6785edde7333097137de5d02a0c13a157a88090f1f4f9c99c41b1a162d722c2f0da