Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03-02-2024 08:25
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-03_26a042a9b8307500bd5d88d848e0bf4f_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-03_26a042a9b8307500bd5d88d848e0bf4f_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-03_26a042a9b8307500bd5d88d848e0bf4f_cryptolocker.exe
-
Size
146KB
-
MD5
26a042a9b8307500bd5d88d848e0bf4f
-
SHA1
e8623b4978840bd327309e3c7744b817f1a0a0b5
-
SHA256
d0462bd2b64e29b16b0985aaa0dd35280fb1a07ef2f6616377521786742463d3
-
SHA512
383edc216e92dd446ea0b34869f545f1692144492d62c0d1ae8781bc50f23e94e9cdcd8739caf883981f3951c947aa1eac1ceff3bd7aaae74f837331400f1dde
-
SSDEEP
1536:V6QFElP6n+gMQMOtEvwDpjQGYQbxGYQbxGYQbPlooHPPFb:V6a+pOtEvwDpjt22v
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000b000000012185-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000b000000012185-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2832 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 3028 2024-02-03_26a042a9b8307500bd5d88d848e0bf4f_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2832 3028 2024-02-03_26a042a9b8307500bd5d88d848e0bf4f_cryptolocker.exe 28 PID 3028 wrote to memory of 2832 3028 2024-02-03_26a042a9b8307500bd5d88d848e0bf4f_cryptolocker.exe 28 PID 3028 wrote to memory of 2832 3028 2024-02-03_26a042a9b8307500bd5d88d848e0bf4f_cryptolocker.exe 28 PID 3028 wrote to memory of 2832 3028 2024-02-03_26a042a9b8307500bd5d88d848e0bf4f_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-03_26a042a9b8307500bd5d88d848e0bf4f_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-03_26a042a9b8307500bd5d88d848e0bf4f_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
146KB
MD56f175b300883a686fb3de25fe8cfb623
SHA17401e5f8245196aa4fe697683edcfc1628b66f15
SHA256b529bae9c2dc23feca76e8f06430edd7f192cd9f73df2429c0b38e9ce93c7d1a
SHA51260d3fa4ae653fbc5b47c75601d6a5b186522f8249151318dcbc6384ffdea4d81497b085a22010c3484911cc1ed6dd2afd57098888e2b39c6f3bcc384fc4fbd7c