Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
04/02/2024, 14:32
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-04_8a64aaae86bf03611c49164c4c92b37c_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-02-04_8a64aaae86bf03611c49164c4c92b37c_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-04_8a64aaae86bf03611c49164c4c92b37c_cryptolocker.exe
-
Size
149KB
-
MD5
8a64aaae86bf03611c49164c4c92b37c
-
SHA1
0672fb1b5b609227170177339f9928e245f4342f
-
SHA256
34a37c14dface77f812683379e78a4325fb147c1b09699a8e1ff48c4aad1547d
-
SHA512
b406bade6bad585c77d63d57530df2bc978c36e3234f02308f4414906f04d9e03e55a3f5ce72823ea50ae4e873c052274cd4ceaab8da54c7c890d52b8c2ead7d
-
SSDEEP
1536:V6QFElP6n+gMQMOtEvwDpjQGYQbxGYQbxGYQbPlooHPPFYrPl:V6a+pOtEvwDpjt22I
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000a000000015626-13.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000a000000015626-13.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 940 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2232 2024-02-04_8a64aaae86bf03611c49164c4c92b37c_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 940 2232 2024-02-04_8a64aaae86bf03611c49164c4c92b37c_cryptolocker.exe 16 PID 2232 wrote to memory of 940 2232 2024-02-04_8a64aaae86bf03611c49164c4c92b37c_cryptolocker.exe 16 PID 2232 wrote to memory of 940 2232 2024-02-04_8a64aaae86bf03611c49164c4c92b37c_cryptolocker.exe 16 PID 2232 wrote to memory of 940 2232 2024-02-04_8a64aaae86bf03611c49164c4c92b37c_cryptolocker.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-04_8a64aaae86bf03611c49164c4c92b37c_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-04_8a64aaae86bf03611c49164c4c92b37c_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
150KB
MD561b072968e858d73931fb6af8191f2f8
SHA19fc241c60dbdccffd84c80766554ca98dcdac047
SHA2561800feada553024110ab54e80df83d7ef1acf58da13555deaa997f40f38673e2
SHA512883b25a70f8716465c97a10135723c8ed60c20a35905b5187454e2aa4d0e7f7aa6d938b924f30632ee0b67c64127ee98dfeb0d4c4f0340f61ab2a1d53defaff5