Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 05:49
Behavioral task
behavioral1
Sample
2024-01-10_53c48e3abb09e3b5d88c7c14a3d2ef88_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-10_53c48e3abb09e3b5d88c7c14a3d2ef88_cryptolocker.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-10_53c48e3abb09e3b5d88c7c14a3d2ef88_cryptolocker.exe
-
Size
92KB
-
MD5
53c48e3abb09e3b5d88c7c14a3d2ef88
-
SHA1
09bb97fadb9be521fbd62ca797c54c8cf3fafb61
-
SHA256
f3db7ec4108eee5e56721a51a662303b5d2daf44a3ce5281679ba2532a2834a8
-
SHA512
25cb254cbb1620516436a36ceef642f7c9e73db916cf58868f39b0be3f1e029f1568aa6ea5dea2cb57ade0a79705431acda59f5f37df4aa19532f99a1216847d
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp01W:AnBdOOtEvwDpj6zI
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2172 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1904 2024-01-10_53c48e3abb09e3b5d88c7c14a3d2ef88_cryptolocker.exe -
resource yara_rule behavioral1/memory/1904-8-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/files/0x000c00000001224c-25.dat upx behavioral1/memory/2172-17-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/memory/1904-13-0x0000000002BC0000-0x0000000002BCF000-memory.dmp upx behavioral1/memory/2172-27-0x0000000000500000-0x000000000050F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1904 wrote to memory of 2172 1904 2024-01-10_53c48e3abb09e3b5d88c7c14a3d2ef88_cryptolocker.exe 14 PID 1904 wrote to memory of 2172 1904 2024-01-10_53c48e3abb09e3b5d88c7c14a3d2ef88_cryptolocker.exe 14 PID 1904 wrote to memory of 2172 1904 2024-01-10_53c48e3abb09e3b5d88c7c14a3d2ef88_cryptolocker.exe 14 PID 1904 wrote to memory of 2172 1904 2024-01-10_53c48e3abb09e3b5d88c7c14a3d2ef88_cryptolocker.exe 14
Processes
-
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"1⤵
- Executes dropped EXE
PID:2172
-
C:\Users\Admin\AppData\Local\Temp\2024-01-10_53c48e3abb09e3b5d88c7c14a3d2ef88_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-10_53c48e3abb09e3b5d88c7c14a3d2ef88_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD56e05becf31ecc8f236440760605cd8c4
SHA1b77a535924f00addf06751d1787f617f25d18561
SHA2563182e72a36357ccfdb09868e8d793fac756821917f4d24904f08e489a1a052c8
SHA512aa856994b48be130f73d4bdcb0e59c9a3ae53dcaacdac5e88caf4f7d32ea8501336b2b22cbf415cc1a40fc93b69e2472cf49ea55bcc43b047121448d5aea5ab2