Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/01/2024, 01:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-28_c151f954b50893422b804422f279c0a8_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-28_c151f954b50893422b804422f279c0a8_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-28_c151f954b50893422b804422f279c0a8_cryptolocker.exe
-
Size
100KB
-
MD5
c151f954b50893422b804422f279c0a8
-
SHA1
acb111bf1b9ae28d16b88ca7c04f35474fa5e7c6
-
SHA256
faef9b88fda0ff84c05450e4a1f2c4fb8fd4750f00bc2e719af250c291de66c7
-
SHA512
a1c3d4b2edf08f18cdc90d3d17ba0f975df65a7fa9721e562d1ba309e8509699a0e99ab48d22fe7d12ff5b4e261a408f0c108dfa77f8481a99713398af1ef980
-
SSDEEP
1536:V6QFElP6n+gMQMOtEvwDpjQGYQbN/PKwNuj2GQi8b/xv4TSe2r8:V6a+pOtEvwDpjtzm
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x0008000000012233-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x0008000000012233-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2716 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2976 2024-01-28_c151f954b50893422b804422f279c0a8_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2976 wrote to memory of 2716 2976 2024-01-28_c151f954b50893422b804422f279c0a8_cryptolocker.exe 28 PID 2976 wrote to memory of 2716 2976 2024-01-28_c151f954b50893422b804422f279c0a8_cryptolocker.exe 28 PID 2976 wrote to memory of 2716 2976 2024-01-28_c151f954b50893422b804422f279c0a8_cryptolocker.exe 28 PID 2976 wrote to memory of 2716 2976 2024-01-28_c151f954b50893422b804422f279c0a8_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-28_c151f954b50893422b804422f279c0a8_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-28_c151f954b50893422b804422f279c0a8_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
101KB
MD5302e90eb36b844241b9334d55b8c2f09
SHA127c3f3c5913ddbcea6aae89b2002b88689aef41d
SHA2569ef2a819eb65c83401261be5e60fa2ee681c935e1d45d6ad0b472945cb83cb01
SHA5129fb2f60e64751e2a39420172d51fea0c0ed0f7744df5e978587856fa1ff14be6cf29bba09d710057fe5eb9003d5498ca9e0fa992286629e359f05382d7cff73e