Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
27/01/2024, 17:36
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-27_c81bc7c5cc88ac434bb39b91729dc503_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-27_c81bc7c5cc88ac434bb39b91729dc503_cryptolocker.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-27_c81bc7c5cc88ac434bb39b91729dc503_cryptolocker.exe
-
Size
41KB
-
MD5
c81bc7c5cc88ac434bb39b91729dc503
-
SHA1
134d1544688a0a2a22ce37d6727989800cd7ef3e
-
SHA256
d139ba078f15c69c93814667c6c105ff1c6c76620b30626f10cd4f2ffca04ff1
-
SHA512
b0084ba07298eb4eefa4aab36ca96fca5ed55fc14040441e066971aedbdf9b3fdff9a5ba25d9535ff6fcd9e15229ae846bd31730b15ba8eebf465b6519e9c3a7
-
SSDEEP
768:b7o/2n1TCraU6GD1a4X0WcO+wMVm+slAMRqRQ:bc/y2lkF0+BjS
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000a000000012243-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 3048 rewok.exe -
Loads dropped DLL 1 IoCs
pid Process 2276 2024-01-27_c81bc7c5cc88ac434bb39b91729dc503_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2276 2024-01-27_c81bc7c5cc88ac434bb39b91729dc503_cryptolocker.exe 3048 rewok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2276 wrote to memory of 3048 2276 2024-01-27_c81bc7c5cc88ac434bb39b91729dc503_cryptolocker.exe 28 PID 2276 wrote to memory of 3048 2276 2024-01-27_c81bc7c5cc88ac434bb39b91729dc503_cryptolocker.exe 28 PID 2276 wrote to memory of 3048 2276 2024-01-27_c81bc7c5cc88ac434bb39b91729dc503_cryptolocker.exe 28 PID 2276 wrote to memory of 3048 2276 2024-01-27_c81bc7c5cc88ac434bb39b91729dc503_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-27_c81bc7c5cc88ac434bb39b91729dc503_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-27_c81bc7c5cc88ac434bb39b91729dc503_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\rewok.exe"C:\Users\Admin\AppData\Local\Temp\rewok.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5a65b7acaa4c36f6ff275ddbca4e94192
SHA18a8a96fd05d4a31a29e0ac100242a6ecb05c2d9a
SHA256efbc023a9ba65c05072c44a900b1997b3b6d75676565c557bee5fc6a78195cbf
SHA512559b906d180bc6cec71b502ad9d212db35182d841ee26c2f13df404003eeb389b749760fbbff6e246521183d2e94fee79fce5a310e70c40e0e0009c8a9b1a11a