Analysis
-
max time kernel
12s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
23/01/2024, 07:40
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-23_75e39820a6c7fea51c43835bcf89690e_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-23_75e39820a6c7fea51c43835bcf89690e_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-23_75e39820a6c7fea51c43835bcf89690e_cryptolocker.exe
-
Size
32KB
-
MD5
75e39820a6c7fea51c43835bcf89690e
-
SHA1
96a7cdb6950aee44c0999d031ba11ac689a8f510
-
SHA256
b7c3c14ef41f70b6450214d85d60caf2d9700883d13c20f95c131d3738fd258b
-
SHA512
14a4689bb98a7c44348054bce807e6d0e7fc4293e0329a948c58d61c9ebc141dab00b5e84e02308f3fdc47e7bfa2581625325d4e3a344ded3b3afb210521c109
-
SSDEEP
384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSznHzu02lOQAu:b/yC4GyNM01GuQMNXw2PSjHC02ltAu
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000b00000001225f-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2248 retln.exe -
Loads dropped DLL 1 IoCs
pid Process 2104 2024-01-23_75e39820a6c7fea51c43835bcf89690e_cryptolocker.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2104 2024-01-23_75e39820a6c7fea51c43835bcf89690e_cryptolocker.exe 2248 retln.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2248 2104 2024-01-23_75e39820a6c7fea51c43835bcf89690e_cryptolocker.exe 28 PID 2104 wrote to memory of 2248 2104 2024-01-23_75e39820a6c7fea51c43835bcf89690e_cryptolocker.exe 28 PID 2104 wrote to memory of 2248 2104 2024-01-23_75e39820a6c7fea51c43835bcf89690e_cryptolocker.exe 28 PID 2104 wrote to memory of 2248 2104 2024-01-23_75e39820a6c7fea51c43835bcf89690e_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-23_75e39820a6c7fea51c43835bcf89690e_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-23_75e39820a6c7fea51c43835bcf89690e_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\retln.exe"C:\Users\Admin\AppData\Local\Temp\retln.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2248
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD54a422fc735c9d988af8f6a2e76633797
SHA18c14685cc6881e7947d6a0870c0c066978b7c82d
SHA256df9304f1b05291e9dede633f44134e7c1c0d68ff34681d22868634d204ee882e
SHA51257044271e877a9515541daa9c596a1c23a8c9b20618eca6371b30e2c9a3eb0f614137c59bef4faa531179c9eb1e4a0dc6936f4b525084a6a596e3d98310bb1bb