Analysis
-
max time kernel
239s -
max time network
277s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10/01/2024, 05:55
Behavioral task
behavioral1
Sample
2024-01-09_6663848c4ceee77ed2793f77d46e4f5f_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-09_6663848c4ceee77ed2793f77d46e4f5f_cryptolocker.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-09_6663848c4ceee77ed2793f77d46e4f5f_cryptolocker.exe
-
Size
84KB
-
MD5
6663848c4ceee77ed2793f77d46e4f5f
-
SHA1
4dca9f126291adb87b4170afaa41bd54c8fb6d95
-
SHA256
e251783e7e5aa9fcc80ed214d1ec1c24e8c0f7116391ec524db91dc92b4de19f
-
SHA512
1f32c0483ffa2166941e5ef9988f7150ac39b4e4030cadb1c225386228fc0a11062699653790ea62db4c85389a18c0f564caaa5dd8bdaaaf023281b1ccbde7e9
-
SSDEEP
768:qkmnjFom/kLyMro2GtOOtEvwDpjeY10Y/YMsvlMdwPK80GQuchoIgtIL:qkmnpomddpMOtEvwDpjJGYQbN/PKwMg8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1140 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2644 2024-01-09_6663848c4ceee77ed2793f77d46e4f5f_cryptolocker.exe -
resource yara_rule behavioral1/memory/2644-0-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/memory/2644-10-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/files/0x0004000000004ed7-13.dat upx behavioral1/memory/1140-19-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/memory/1140-27-0x0000000000500000-0x000000000050F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2644 wrote to memory of 1140 2644 2024-01-09_6663848c4ceee77ed2793f77d46e4f5f_cryptolocker.exe 27 PID 2644 wrote to memory of 1140 2644 2024-01-09_6663848c4ceee77ed2793f77d46e4f5f_cryptolocker.exe 27 PID 2644 wrote to memory of 1140 2644 2024-01-09_6663848c4ceee77ed2793f77d46e4f5f_cryptolocker.exe 27 PID 2644 wrote to memory of 1140 2644 2024-01-09_6663848c4ceee77ed2793f77d46e4f5f_cryptolocker.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-09_6663848c4ceee77ed2793f77d46e4f5f_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-09_6663848c4ceee77ed2793f77d46e4f5f_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:1140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD56277cdc92ce18bbd1b25f6511f70beed
SHA1c70b901a45f65a6b70a4b8a362e1bb16c284a21c
SHA256eaef51e0299d2af2682e51bca831e30bde88d74b6c1219ac70f8cece13b8a2ad
SHA51245272113020b01f74e811b488eca82bcf6143cddf488096c0b2212631393324f1ec646d55cda1aa6fa7b4e982498f3ab4c8a0aac9f948bbc94e20c382e23243b