Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18-01-2024 13:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-18_9f46c6231e4a3b70c8f1fc80841398c1_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-18_9f46c6231e4a3b70c8f1fc80841398c1_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-18_9f46c6231e4a3b70c8f1fc80841398c1_cryptolocker.exe
-
Size
49KB
-
MD5
9f46c6231e4a3b70c8f1fc80841398c1
-
SHA1
ecc64ccf21d5490f894767e86fe64c0287305ac5
-
SHA256
37aa672a726087cba83eb3776ccd862d10fc5e1c52238648d6513278b70ac792
-
SHA512
310889dcac5075861c3104e9b39fb5fa99488f925a15ff0f56f2b8bd081931d0e8f387e3cf8ef671d5e7983924d0855d704d992c384ad89bd9dc35fffb660725
-
SSDEEP
768:bIDOw9UiaCHfjnE0Sf88AvvP1oghYvm9/6D8jnPxyV4tFVgQi:bIDOw9a0Dwo3P1ojvUSD4PRtFVgz
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000c00000001224c-13.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2676 lossy.exe -
Loads dropped DLL 1 IoCs
pid Process 2112 2024-01-18_9f46c6231e4a3b70c8f1fc80841398c1_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2676 2112 2024-01-18_9f46c6231e4a3b70c8f1fc80841398c1_cryptolocker.exe 28 PID 2112 wrote to memory of 2676 2112 2024-01-18_9f46c6231e4a3b70c8f1fc80841398c1_cryptolocker.exe 28 PID 2112 wrote to memory of 2676 2112 2024-01-18_9f46c6231e4a3b70c8f1fc80841398c1_cryptolocker.exe 28 PID 2112 wrote to memory of 2676 2112 2024-01-18_9f46c6231e4a3b70c8f1fc80841398c1_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-18_9f46c6231e4a3b70c8f1fc80841398c1_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-18_9f46c6231e4a3b70c8f1fc80841398c1_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\lossy.exe"C:\Users\Admin\AppData\Local\Temp\lossy.exe"2⤵
- Executes dropped EXE
PID:2676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD56fe11d55d9cabc08654e26ce2119f17f
SHA16aa17027db94ea9682164eac99e8eea08fd4245d
SHA256fcadae2dbabcec3cb527bf8f47e4a1730cd290c7a64cb05314f5372032482566
SHA5126d0ead8152ea7de4538d2b37b6344f61f9528dec7b7988d1e81fece3efc7b6c182a7a6945e67009fc5e3bdfae84c458b3c8c243beeee1c96b121ef5484c475c0