Analysis
-
max time kernel
1s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
05/01/2024, 05:51
Behavioral task
behavioral1
Sample
2024-01-01_de2d2e7a4e681160eeed2501fdf8db23_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-01_de2d2e7a4e681160eeed2501fdf8db23_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-01_de2d2e7a4e681160eeed2501fdf8db23_cryptolocker.exe
-
Size
56KB
-
MD5
de2d2e7a4e681160eeed2501fdf8db23
-
SHA1
2b8a157f7fb60c6e9ba04093c84db3b3c9560d89
-
SHA256
3f83853f9dcfdafcc2fdbb3bf2e1eb78012ccd7ef052a9501efc3d53a49655f4
-
SHA512
563882416e27dac42ed1d2cb9bee8aaab0941d6ba81d9a888f2514077256026c7f83550f8565b8d1555f08f9eadc5655682cdc19d2423265ddbef447db5f1ccc
-
SSDEEP
768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5ax848+hIK:z6QFElP6n+gKmddpMOtEvwDpj9aYan
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2728 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2400 2024-01-01_de2d2e7a4e681160eeed2501fdf8db23_cryptolocker.exe -
resource yara_rule behavioral1/memory/2400-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2400-15-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x0009000000012252-25.dat upx behavioral1/memory/2728-17-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x0009000000012252-14.dat upx behavioral1/memory/2728-28-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2728 2400 2024-01-01_de2d2e7a4e681160eeed2501fdf8db23_cryptolocker.exe 16 PID 2400 wrote to memory of 2728 2400 2024-01-01_de2d2e7a4e681160eeed2501fdf8db23_cryptolocker.exe 16 PID 2400 wrote to memory of 2728 2400 2024-01-01_de2d2e7a4e681160eeed2501fdf8db23_cryptolocker.exe 16 PID 2400 wrote to memory of 2728 2400 2024-01-01_de2d2e7a4e681160eeed2501fdf8db23_cryptolocker.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"1⤵
- Executes dropped EXE
PID:2728
-
C:\Users\Admin\AppData\Local\Temp\2024-01-01_de2d2e7a4e681160eeed2501fdf8db23_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-01_de2d2e7a4e681160eeed2501fdf8db23_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD55675d43390fefb7dc82721dad8fffc69
SHA182baf05002635d3f4e55d98b55e1592728281288
SHA2568a5fe4c23b82e484826bf5a886fe2e85e5576dc77dd405e5b7499a1115d919ed
SHA5120c44a1a88c37ec098eb95415916748d43f0d404e8d857f8b37056ab1d6e7815938cbcfc044e7fb542506de981e501a864ad320687588c4dff41c99105f4f4de1
-
Filesize
53KB
MD5948156bfeec6400002ca6fc791c9957e
SHA1596540a03780e65abc3dd34a461208dbeb434aeb
SHA256ed8528e686bbd5dfdde6617e10973357751d46622515455b244622df05aa5b83
SHA512cbdb3fef749111915baa5715b3a249bfa6d80de727de234bd7710d1e3bd8dc69eefe4840d73aada7e7d23da176b3085295145d7253e382d4fa78a7021045aa5e