Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 17:31
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-25_7a967491d20b799cab6af850c73af3be_cryptolocker.exe
Resource
win7-20231215-en
General
-
Target
2024-01-25_7a967491d20b799cab6af850c73af3be_cryptolocker.exe
-
Size
51KB
-
MD5
7a967491d20b799cab6af850c73af3be
-
SHA1
325332d1fe41cb467ab9b65b89101e17eff34499
-
SHA256
e1a013601c6b0e33e00e091d7cbf9991103359e81baee1daecb8f77f7a33b3e5
-
SHA512
9573ead97632f2b4dd9f2e2fbe9107d1573c64592c73f1823dcbb787edc123a6a25afd4b0d9db6c7d2e36815287de4c0424252f280b5c0054b412dbdbfaf0954
-
SSDEEP
768:bIDOw9UiaCHfjnE0Sfa7ilR0p9u6p4ICNBCXK9GZ:bIDOw9a0DwitDZzv
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
Processes:
resource yara_rule behavioral1/files/0x000a00000001224e-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
Processes:
lossy.exepid Process 2212 lossy.exe -
Loads dropped DLL 1 IoCs
Processes:
2024-01-25_7a967491d20b799cab6af850c73af3be_cryptolocker.exepid Process 2148 2024-01-25_7a967491d20b799cab6af850c73af3be_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
2024-01-25_7a967491d20b799cab6af850c73af3be_cryptolocker.exedescription pid Process procid_target PID 2148 wrote to memory of 2212 2148 2024-01-25_7a967491d20b799cab6af850c73af3be_cryptolocker.exe 28 PID 2148 wrote to memory of 2212 2148 2024-01-25_7a967491d20b799cab6af850c73af3be_cryptolocker.exe 28 PID 2148 wrote to memory of 2212 2148 2024-01-25_7a967491d20b799cab6af850c73af3be_cryptolocker.exe 28 PID 2148 wrote to memory of 2212 2148 2024-01-25_7a967491d20b799cab6af850c73af3be_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_7a967491d20b799cab6af850c73af3be_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-25_7a967491d20b799cab6af850c73af3be_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\lossy.exe"C:\Users\Admin\AppData\Local\Temp\lossy.exe"2⤵
- Executes dropped EXE
PID:2212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD5fff6d96feae5a88d4416b9c0c3bf1119
SHA11aa580da457a2c9f0931623a5f58c62b859d0d4d
SHA2569acc9f834d4e8ec30f0d834d4ccd1fb8b3f5e6d4f6c140bed0adde8a74be1e96
SHA51208f44f731bf16b99f6b64e82ef5b2ab68e468a103fb4517229198be82c61de52771816b5cf2f1ef2cab81a57f6cf38b1313f4dc58bda9bca5d80c0f36148c097