Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09-01-2024 06:35
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-08_030661028035c81fbb08954f85c42057_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-08_030661028035c81fbb08954f85c42057_cryptolocker.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-08_030661028035c81fbb08954f85c42057_cryptolocker.exe
-
Size
92KB
-
MD5
030661028035c81fbb08954f85c42057
-
SHA1
a68769d4d81ed1e76637b5f9f01ed63903890d56
-
SHA256
fca8268ba17843a267198d6ef5b487dbb70c65d41bec9b81983c43630091bee8
-
SHA512
0f85b4eb0d4c85dcfa4833fd12e7d51d0419893bce4a5d0bbfab136610f0bbdb43ec00df1883a69b77740685fe50189b33f48bb3c13ad57fdd7dedc0e64656d2
-
SSDEEP
1536:26QFElP6n+gBQMOtEvwDpjQGYQbN/PKwNC7:26a+2OtEvwDpjtzQ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2364 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 688 2024-01-08_030661028035c81fbb08954f85c42057_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 688 wrote to memory of 2364 688 2024-01-08_030661028035c81fbb08954f85c42057_cryptolocker.exe 28 PID 688 wrote to memory of 2364 688 2024-01-08_030661028035c81fbb08954f85c42057_cryptolocker.exe 28 PID 688 wrote to memory of 2364 688 2024-01-08_030661028035c81fbb08954f85c42057_cryptolocker.exe 28 PID 688 wrote to memory of 2364 688 2024-01-08_030661028035c81fbb08954f85c42057_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-08_030661028035c81fbb08954f85c42057_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-08_030661028035c81fbb08954f85c42057_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2364
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD53ad4425a2b9b76521ddb39f7ac669b7d
SHA10b062de1979b1c826ac12dbf5f15136693f1205c
SHA256271a5c1f6267067859653e813893b09ab142e9641af67d658341294a432e6f4a
SHA5124bed4d1870fb86b42c2476faa5023656d87f54f7711fed3ae63adea52d67583bed86cbc3b76d68fa68c05b40851f86b0535b4e98e6a08fd62d207b5d99882a85