Analysis
-
max time kernel
12s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 05:55
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-10_adf4adc38f619ae56688125f345fb628_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-10_adf4adc38f619ae56688125f345fb628_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-10_adf4adc38f619ae56688125f345fb628_cryptolocker.exe
-
Size
25KB
-
MD5
adf4adc38f619ae56688125f345fb628
-
SHA1
8286ed3e131ccc3bfe7d2dfaa898816457b3a817
-
SHA256
c9f9bcdcd39d3e3ac43e30cf93fd068f732ffd7bbc2757c7857c03fe07857006
-
SHA512
54edd194516cefea72e212411cf0113971f11e2bd4df8f08e1367b5e6d48f58daf57802b3a4a4fe700c71360fdf780b02eb297f44e5c87b4cbca1dbf5bf54ab2
-
SSDEEP
384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zznAn:b/yC4GyNM01GuQMNXAn
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2716 retln.exe -
Loads dropped DLL 1 IoCs
pid Process 848 2024-01-10_adf4adc38f619ae56688125f345fb628_cryptolocker.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 848 2024-01-10_adf4adc38f619ae56688125f345fb628_cryptolocker.exe 2716 retln.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 848 wrote to memory of 2716 848 2024-01-10_adf4adc38f619ae56688125f345fb628_cryptolocker.exe 28 PID 848 wrote to memory of 2716 848 2024-01-10_adf4adc38f619ae56688125f345fb628_cryptolocker.exe 28 PID 848 wrote to memory of 2716 848 2024-01-10_adf4adc38f619ae56688125f345fb628_cryptolocker.exe 28 PID 848 wrote to memory of 2716 848 2024-01-10_adf4adc38f619ae56688125f345fb628_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-10_adf4adc38f619ae56688125f345fb628_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-10_adf4adc38f619ae56688125f345fb628_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Users\Admin\AppData\Local\Temp\retln.exe"C:\Users\Admin\AppData\Local\Temp\retln.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD5095a309112c1c979b93ecb671dcb85d9
SHA1a9406711d1f224ff95d2cecf167075082c2687d5
SHA2569a0ba0fc6f92020b1bdac9d067811f52ca241ebded934b96c674c871cb846a5d
SHA512719e1913a5be5ab674a00631b4eff68cf4ecc7360663f1b19809bc90711671a8f2d5ba8fbed35afc4a87a06dd4a367223bc5ad468cd5b5218d0c25989cdd1178