Analysis
-
max time kernel
132s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04-02-2024 15:33
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-04_a164427cd50b27593c8253b6c587aefe_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-04_a164427cd50b27593c8253b6c587aefe_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-04_a164427cd50b27593c8253b6c587aefe_cryptolocker.exe
-
Size
149KB
-
MD5
a164427cd50b27593c8253b6c587aefe
-
SHA1
48abbb6e2542089e6a62e1c1b5ac8362793fb43a
-
SHA256
8dbe8dd87884556a5a59e5980cab5e7c98b1593364d23a5dad8e6349b3d35938
-
SHA512
5a9c537e1407697b7bc326f4e36fdae7af8466482952f8f3bd8424ff592e2385ff3f350468083799f3558b0afdf7176fea2a429b5f204567f42f83988e114081
-
SSDEEP
1536:V6QFElP6n+gMQMOtEvwDpjQGYQbxGYQbxGYQbPlooHPPFYrPu:V6a+pOtEvwDpjt22P
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000c000000012252-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000c000000012252-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2132 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2180 2024-02-04_a164427cd50b27593c8253b6c587aefe_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2132 2180 2024-02-04_a164427cd50b27593c8253b6c587aefe_cryptolocker.exe 28 PID 2180 wrote to memory of 2132 2180 2024-02-04_a164427cd50b27593c8253b6c587aefe_cryptolocker.exe 28 PID 2180 wrote to memory of 2132 2180 2024-02-04_a164427cd50b27593c8253b6c587aefe_cryptolocker.exe 28 PID 2180 wrote to memory of 2132 2180 2024-02-04_a164427cd50b27593c8253b6c587aefe_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-04_a164427cd50b27593c8253b6c587aefe_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-04_a164427cd50b27593c8253b6c587aefe_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
150KB
MD56d4cee11960f2fa38ac33c0c6c5e45ca
SHA1289c87ced103d5dbb3aed20d77bd205c8571fbb0
SHA2564e5c7314e68248e59e246b452d413822c93b6a898770590b9e0582cd6923165f
SHA512bb2ed55d599ad7035e54578553300e5321be65923d997d2f0cbd4f39772ccff926eb541ae9b948f100a353bd1cf6d574470c57024c56085203128f0f2ac699ad