Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
27/01/2024, 12:30
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-27_872d0f8f83fc1d1dc2b3a038596beb3a_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-27_872d0f8f83fc1d1dc2b3a038596beb3a_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-27_872d0f8f83fc1d1dc2b3a038596beb3a_cryptolocker.exe
-
Size
43KB
-
MD5
872d0f8f83fc1d1dc2b3a038596beb3a
-
SHA1
aa53fcc9482e6295d907ec16f852d06af65aa911
-
SHA256
350f6a764a175f8b14788f5cf9d36efb9a26d0060fc4278dbfd2d4ffd6509435
-
SHA512
a166ef64d2c26d7d019eb69c111d52188f624bfa400f7d01a089e0980ee31ede2e1c95e84216acd6ee67c35925d512e5da2ab3abbeed77ab6e9cc30ea673a1b3
-
SSDEEP
768:wHGGaSawqnwjRQ6ESlmFOsPoOdQtOOtEvwDpjm6j4AYsqSh+DETkedm+YUS5s:YGzl5wjRQBBOsP1QMOtEvwDpjl39+D+Z
Malware Config
Signatures
-
Detection of CryptoLocker Variants 4 IoCs
resource yara_rule behavioral1/memory/1308-1-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_rule2 behavioral1/memory/1308-14-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x0007000000012281-11.dat CryptoLocker_rule2 behavioral1/memory/2352-16-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 4 IoCs
resource yara_rule behavioral1/memory/1308-1-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_set1 behavioral1/memory/1308-14-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_set1 behavioral1/files/0x0007000000012281-11.dat CryptoLocker_set1 behavioral1/memory/2352-16-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2352 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1308 2024-01-27_872d0f8f83fc1d1dc2b3a038596beb3a_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1308 wrote to memory of 2352 1308 2024-01-27_872d0f8f83fc1d1dc2b3a038596beb3a_cryptolocker.exe 28 PID 1308 wrote to memory of 2352 1308 2024-01-27_872d0f8f83fc1d1dc2b3a038596beb3a_cryptolocker.exe 28 PID 1308 wrote to memory of 2352 1308 2024-01-27_872d0f8f83fc1d1dc2b3a038596beb3a_cryptolocker.exe 28 PID 1308 wrote to memory of 2352 1308 2024-01-27_872d0f8f83fc1d1dc2b3a038596beb3a_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-27_872d0f8f83fc1d1dc2b3a038596beb3a_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-27_872d0f8f83fc1d1dc2b3a038596beb3a_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD5c06bb0632f0f810bae304d5b0d21b3e1
SHA10980a3071f28d78b1e7cbd1f30c7555ca0e02870
SHA25663adb0a00779f351b6898b8a45d7c7727ba7dc6320bdb2cfec913e9380ea4935
SHA5121f227926e4bb044775f4d6ff9696235903986475fc36f188d74e7b1efc10d523f1f3439635a2b3ef65ff85825977d8df48c22a44a9bb61222b76115c47b93521