Analysis
-
max time kernel
0s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
05/01/2024, 05:51
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-01_d28a920958648608f2084d067501e707_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-01_d28a920958648608f2084d067501e707_cryptolocker.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-01_d28a920958648608f2084d067501e707_cryptolocker.exe
-
Size
44KB
-
MD5
d28a920958648608f2084d067501e707
-
SHA1
e4a5048a59c4a612fefffc3eecebe434ef4d6637
-
SHA256
7a26a413ba39fd898dc46258c3d93c292724db31378b12ead20afae17a557cbe
-
SHA512
5e87246ebeed23dfdc98b1dbcc2cbcfcc6df1f85479d7090a6e54c34fac1219ea1e423dbd419e8187b36d0b1ade94d0ec6eaa2fe3ecf8c8468b05a55b7094c72
-
SSDEEP
768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05WVwR:qmbhXDmjr5MOtEvwDpj5cDtKkQZQC0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2484 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2440 2024-01-01_d28a920958648608f2084d067501e707_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2484 2440 2024-01-01_d28a920958648608f2084d067501e707_cryptolocker.exe 16 PID 2440 wrote to memory of 2484 2440 2024-01-01_d28a920958648608f2084d067501e707_cryptolocker.exe 16 PID 2440 wrote to memory of 2484 2440 2024-01-01_d28a920958648608f2084d067501e707_cryptolocker.exe 16 PID 2440 wrote to memory of 2484 2440 2024-01-01_d28a920958648608f2084d067501e707_cryptolocker.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"1⤵
- Executes dropped EXE
PID:2484
-
C:\Users\Admin\AppData\Local\Temp\2024-01-01_d28a920958648608f2084d067501e707_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-01_d28a920958648608f2084d067501e707_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53a8ec8b321a2392f8b002b34ecefa4cc
SHA18910e40735364772afab891a5a2c1ae0ea6dad55
SHA256094c20e7eaff0122e0d3b77195ff5a50b3dd3bcb97ef0929558cb3368d3c2b2a
SHA5125ecf3422e1ef61b835c0fdaca40cf87fdbafad7ecf11f9c442c7067bbc089946acb792bb1b6b6c5cb81eaead7f8fe79251505f3c0afdf17dd569e60d97c2e4f9
-
Filesize
6KB
MD5b831f0becdb61d4e02c6b0fbbc2a407f
SHA197af68e8c595c3defe32999c3741c6f29736cbe8
SHA2569e176e43bae7b74b2cf066a5530cef5911e66a6453150f1e326c7ba6677a8143
SHA51269579f965b81e8fa4edc6f375dd07d3f8bff6e4f2376b18432761bc2382222d9903d076806fc92f0e7acfacae6d3e1861ad57603d4eaee8838fdee9701916193
-
Filesize
45KB
MD5ba5013415d7536d05f5c491f75325bd4
SHA17ea85335fa9f140cee965df9d675eccb93272a17
SHA256e15dc1c2758fc60dc2604cc4795ff13d5b55b8962d20ef6cdcb5c35fa5538afe
SHA5120ccd395b45664c15749671cf4ee8761f12eab312e69b67bd5c3f1e7d0a36667a2b9177e3d7760660cfaecab7c3de1ee345a19cf7810b91747098644788860ed1