Analysis
-
max time kernel
0s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
12/01/2024, 05:55
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-11_1e3637c9d9ac95e11f79f3ba185133af_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-11_1e3637c9d9ac95e11f79f3ba185133af_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-11_1e3637c9d9ac95e11f79f3ba185133af_cryptolocker.exe
-
Size
51KB
-
MD5
1e3637c9d9ac95e11f79f3ba185133af
-
SHA1
97a6105df9e174301377004b3141baf4c60fcdb3
-
SHA256
a92f800f4a08314ad730a76e607e96866794cb05dd6743bb3a70a46694b0693a
-
SHA512
8d113cf9f50e4aca4fde79de6e2ad0b1140353cffc61f47576cc70820b0304dc0c23cad564a1ffe956ab4fdb3fbc039aa221c834023b529c4191217e022ea61b
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/BtOOtEvwDpjBVaD3E09vaTiSfQaVg0:X6QFElP6n+gJBMOtEvwDpjBtE1yB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2164 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2196 2024-01-11_1e3637c9d9ac95e11f79f3ba185133af_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2164 2196 2024-01-11_1e3637c9d9ac95e11f79f3ba185133af_cryptolocker.exe 16 PID 2196 wrote to memory of 2164 2196 2024-01-11_1e3637c9d9ac95e11f79f3ba185133af_cryptolocker.exe 16 PID 2196 wrote to memory of 2164 2196 2024-01-11_1e3637c9d9ac95e11f79f3ba185133af_cryptolocker.exe 16 PID 2196 wrote to memory of 2164 2196 2024-01-11_1e3637c9d9ac95e11f79f3ba185133af_cryptolocker.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"1⤵
- Executes dropped EXE
PID:2164
-
C:\Users\Admin\AppData\Local\Temp\2024-01-11_1e3637c9d9ac95e11f79f3ba185133af_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-11_1e3637c9d9ac95e11f79f3ba185133af_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2196