Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 14:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-25_7d406da2020a1868f2b0eafeeb002ecf_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-25_7d406da2020a1868f2b0eafeeb002ecf_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-25_7d406da2020a1868f2b0eafeeb002ecf_cryptolocker.exe
-
Size
49KB
-
MD5
7d406da2020a1868f2b0eafeeb002ecf
-
SHA1
76db7abf5c64794e72ce62f80a80c9500827e5fd
-
SHA256
46ce507ff575663f230c2b6b8502bd5d3c79dd53cebafd5c263710e0f0aaba07
-
SHA512
98a24716fa2d40b254073ac1b158c35256b2de8b09710a2ad8b8510bca0a28bf46ebde051322d64766da588c4c4f08c689ba24e167e3da64ba4566eb0384c50d
-
SSDEEP
768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpjeJQ7suIlsw92KFXpQenh/pX:V6QFElP6n+gMQMOtEvwDpjeJQ7pojkmX
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000a00000001224a-13.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000a00000001224a-13.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2868 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1628 2024-01-25_7d406da2020a1868f2b0eafeeb002ecf_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1628 wrote to memory of 2868 1628 2024-01-25_7d406da2020a1868f2b0eafeeb002ecf_cryptolocker.exe 28 PID 1628 wrote to memory of 2868 1628 2024-01-25_7d406da2020a1868f2b0eafeeb002ecf_cryptolocker.exe 28 PID 1628 wrote to memory of 2868 1628 2024-01-25_7d406da2020a1868f2b0eafeeb002ecf_cryptolocker.exe 28 PID 1628 wrote to memory of 2868 1628 2024-01-25_7d406da2020a1868f2b0eafeeb002ecf_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_7d406da2020a1868f2b0eafeeb002ecf_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-25_7d406da2020a1868f2b0eafeeb002ecf_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD556d3516fff46f393ac78567783ab64e6
SHA13a51c05fd844e0b5131ecf14d0cc7b8f0aa0f653
SHA256ef52777ab9d98d76d8d39145f3a787432e643a3127505d911d62b1ba036a0491
SHA512832ac5982d0611fda62537dd1fb04c17645adc82788761b399d508697fa9ead4be85cbea3fc03bfb031cadde09bd3657636786de547f98cdba8e739a9504b5ab