Analysis
-
max time kernel
0s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18-01-2024 22:41
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-18_4288ae8a1edd0e80c462a22b58ca1f47_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-18_4288ae8a1edd0e80c462a22b58ca1f47_cryptolocker.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-18_4288ae8a1edd0e80c462a22b58ca1f47_cryptolocker.exe
-
Size
33KB
-
MD5
4288ae8a1edd0e80c462a22b58ca1f47
-
SHA1
f6084d9dc7a755c0ebae8b97396cc8164fcb5b60
-
SHA256
3958ca44d5c3950604259628653e2376a29b5250cfc0cab9c51453f80c74fd73
-
SHA512
86cf8841519e0bd29dd0ee9f1198d8fc11505bf9a7aa9763213e965900f44d6c8ce70ff9c4311206a19f16088f81058702a9efa39f09465393192018f2fa06e9
-
SSDEEP
384:bAvMaNGh4z7CG3POOvbRSLoF/F0QU5XYFnufc/zzogFzpjufAq18st8e:bAvJCYOOvbRPDEgXVFzpCYVu
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000b000000012234-22.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2156 demka.exe -
Loads dropped DLL 1 IoCs
pid Process 1872 2024-01-18_4288ae8a1edd0e80c462a22b58ca1f47_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1872 2024-01-18_4288ae8a1edd0e80c462a22b58ca1f47_cryptolocker.exe 2156 demka.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1872 wrote to memory of 2156 1872 2024-01-18_4288ae8a1edd0e80c462a22b58ca1f47_cryptolocker.exe 16 PID 1872 wrote to memory of 2156 1872 2024-01-18_4288ae8a1edd0e80c462a22b58ca1f47_cryptolocker.exe 16 PID 1872 wrote to memory of 2156 1872 2024-01-18_4288ae8a1edd0e80c462a22b58ca1f47_cryptolocker.exe 16 PID 1872 wrote to memory of 2156 1872 2024-01-18_4288ae8a1edd0e80c462a22b58ca1f47_cryptolocker.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-18_4288ae8a1edd0e80c462a22b58ca1f47_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-18_4288ae8a1edd0e80c462a22b58ca1f47_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\demka.exe"C:\Users\Admin\AppData\Local\Temp\demka.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594d5e5b630c8e02a7fe754d6886eab7a
SHA1686eb1b959cd211f56874c6dd266ece7246c5a16
SHA256a7f4987c781bf32dfbfe9217d4fbc779e63eecc6b47130c27d5d1471a8ab712c
SHA512326e478384d8e22cde3261609e8660710aa4809a28577dd742586eb087358e4c47bc6a20960d40d02a031805249aa37670c8941c94dbeb12ebc7de578212226f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
33KB
MD5aaf462882d3b6700f428b5225e2dd132
SHA17741b652c538fca78ecbfd84627c626ba7b822e4
SHA2564fbaae7f3008c6b0141e39a737f81f1be1d2f8d68f40e0ac96a331bdbb3a1ce4
SHA512f4aaa87b8feb71677a39d451f2696523c762b3d328cfa59b953e6b02fed89d81e2961ae61e703db8f77271c6ba6e14d35227dced0a446898872df4082def5e66