Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07-02-2024 09:01
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-07_e89be3c49a4a6b1bdfd5a75f4ba47ceb_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-07_e89be3c49a4a6b1bdfd5a75f4ba47ceb_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-07_e89be3c49a4a6b1bdfd5a75f4ba47ceb_cryptolocker.exe
-
Size
370KB
-
MD5
e89be3c49a4a6b1bdfd5a75f4ba47ceb
-
SHA1
e903d24265e56113706bfde379a6f2a6acb1851e
-
SHA256
c6a557f58591a6cb419bf81687d42c922fcc4dd870873d8692c78e88c71caaec
-
SHA512
34a2049345596e810b5a72e8141a7ec233f95d7639c09beab8d21c06cef5a1b6490491e447e3564cbefce05cd5d58807e898985a49819ad49e84d1e056163d0b
-
SSDEEP
6144:lHrjZhghBCLlsBxFJWCDA/tHHTdrXvdWgTO3x5N22vWvLRKKAX5l++SyVISD:BZhghBCMxFJWCE/tHz9/FT85I2vCMX5V
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Deletes itself 1 IoCs
Processes:
Avywuixyxmexxtr.exepid process 2860 Avywuixyxmexxtr.exe -
Executes dropped EXE 2 IoCs
Processes:
Avywuixyxmexxtr.exeAvywuixyxmexxtr.exepid process 2860 Avywuixyxmexxtr.exe 2728 Avywuixyxmexxtr.exe -
Loads dropped DLL 2 IoCs
Processes:
2024-02-07_e89be3c49a4a6b1bdfd5a75f4ba47ceb_cryptolocker.exeAvywuixyxmexxtr.exepid process 2188 2024-02-07_e89be3c49a4a6b1bdfd5a75f4ba47ceb_cryptolocker.exe 2860 Avywuixyxmexxtr.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Avywuixyxmexxtr.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\*CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
2024-02-07_e89be3c49a4a6b1bdfd5a75f4ba47ceb_cryptolocker.exeAvywuixyxmexxtr.exedescription pid process target process PID 2188 wrote to memory of 2860 2188 2024-02-07_e89be3c49a4a6b1bdfd5a75f4ba47ceb_cryptolocker.exe Avywuixyxmexxtr.exe PID 2188 wrote to memory of 2860 2188 2024-02-07_e89be3c49a4a6b1bdfd5a75f4ba47ceb_cryptolocker.exe Avywuixyxmexxtr.exe PID 2188 wrote to memory of 2860 2188 2024-02-07_e89be3c49a4a6b1bdfd5a75f4ba47ceb_cryptolocker.exe Avywuixyxmexxtr.exe PID 2188 wrote to memory of 2860 2188 2024-02-07_e89be3c49a4a6b1bdfd5a75f4ba47ceb_cryptolocker.exe Avywuixyxmexxtr.exe PID 2860 wrote to memory of 2728 2860 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe PID 2860 wrote to memory of 2728 2860 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe PID 2860 wrote to memory of 2728 2860 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe PID 2860 wrote to memory of 2728 2860 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-07_e89be3c49a4a6b1bdfd5a75f4ba47ceb_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-07_e89be3c49a4a6b1bdfd5a75f4ba47ceb_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" "-rC:\Users\Admin\AppData\Local\Temp\2024-02-07_e89be3c49a4a6b1bdfd5a75f4ba47ceb_cryptolocker.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" -w1203⤵
- Executes dropped EXE
PID:2728
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
370KB
MD5e89be3c49a4a6b1bdfd5a75f4ba47ceb
SHA1e903d24265e56113706bfde379a6f2a6acb1851e
SHA256c6a557f58591a6cb419bf81687d42c922fcc4dd870873d8692c78e88c71caaec
SHA51234a2049345596e810b5a72e8141a7ec233f95d7639c09beab8d21c06cef5a1b6490491e447e3564cbefce05cd5d58807e898985a49819ad49e84d1e056163d0b