Analysis
-
max time kernel
294s -
max time network
341s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18/01/2024, 22:39
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-18_3dd3c068cbfdfe226280415c7add75ba_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-18_3dd3c068cbfdfe226280415c7add75ba_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-18_3dd3c068cbfdfe226280415c7add75ba_cryptolocker.exe
-
Size
49KB
-
MD5
3dd3c068cbfdfe226280415c7add75ba
-
SHA1
2c93f086dcd82e7905a9b0d9da899eb05a50d2c6
-
SHA256
4e870cce5a3da7d38feff2547a204376e7fabdcd959ed4e8a4e1ae9fa06299df
-
SHA512
7eb729289b9efa0b8c95b159456beb29c6acd52da4cd47d7a596c91a6e36e0747a06ab785de209abda8dca4af77c24ed6696bd47c729f2c777c9886e95b6358c
-
SSDEEP
1536:V6QFElP6n+gMQMOtEvwDpjeJQ7pojaklW:V6a+pOtEvwDpjd
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x0004000000004ed7-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x0004000000004ed7-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 804 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1516 2024-01-18_3dd3c068cbfdfe226280415c7add75ba_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1516 wrote to memory of 804 1516 2024-01-18_3dd3c068cbfdfe226280415c7add75ba_cryptolocker.exe 27 PID 1516 wrote to memory of 804 1516 2024-01-18_3dd3c068cbfdfe226280415c7add75ba_cryptolocker.exe 27 PID 1516 wrote to memory of 804 1516 2024-01-18_3dd3c068cbfdfe226280415c7add75ba_cryptolocker.exe 27 PID 1516 wrote to memory of 804 1516 2024-01-18_3dd3c068cbfdfe226280415c7add75ba_cryptolocker.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-18_3dd3c068cbfdfe226280415c7add75ba_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-18_3dd3c068cbfdfe226280415c7add75ba_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD51465b17c4a693a8cdce807416a1e97a0
SHA11a173dbc0ed4c6b3ca9490769090744de4ecd1c0
SHA256e126427801f6f8b981e0b1414aa90b9991fc997b2ad045fc052989fca9d1d107
SHA5124e57587c3123f53327292a98f78e6646875f682d4252e17a77f70178cc5ea750f349e8a0e27451674e182721e8908ff132132af491347899b0150043b15bad86