Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07-02-2024 09:01
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-07_e89be3c49a4a6b1bdfd5a75f4ba47ceb_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-07_e89be3c49a4a6b1bdfd5a75f4ba47ceb_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-07_e89be3c49a4a6b1bdfd5a75f4ba47ceb_cryptolocker.exe
-
Size
370KB
-
MD5
e89be3c49a4a6b1bdfd5a75f4ba47ceb
-
SHA1
e903d24265e56113706bfde379a6f2a6acb1851e
-
SHA256
c6a557f58591a6cb419bf81687d42c922fcc4dd870873d8692c78e88c71caaec
-
SHA512
34a2049345596e810b5a72e8141a7ec233f95d7639c09beab8d21c06cef5a1b6490491e447e3564cbefce05cd5d58807e898985a49819ad49e84d1e056163d0b
-
SSDEEP
6144:lHrjZhghBCLlsBxFJWCDA/tHHTdrXvdWgTO3x5N22vWvLRKKAX5l++SyVISD:BZhghBCMxFJWCE/tHz9/FT85I2vCMX5V
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Deletes itself 1 IoCs
Processes:
Avywuixyxmexxtr.exepid process 872 Avywuixyxmexxtr.exe -
Executes dropped EXE 2 IoCs
Processes:
Avywuixyxmexxtr.exeAvywuixyxmexxtr.exepid process 872 Avywuixyxmexxtr.exe 3480 Avywuixyxmexxtr.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Avywuixyxmexxtr.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\*CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
2024-02-07_e89be3c49a4a6b1bdfd5a75f4ba47ceb_cryptolocker.exeAvywuixyxmexxtr.exedescription pid process target process PID 2572 wrote to memory of 872 2572 2024-02-07_e89be3c49a4a6b1bdfd5a75f4ba47ceb_cryptolocker.exe Avywuixyxmexxtr.exe PID 2572 wrote to memory of 872 2572 2024-02-07_e89be3c49a4a6b1bdfd5a75f4ba47ceb_cryptolocker.exe Avywuixyxmexxtr.exe PID 2572 wrote to memory of 872 2572 2024-02-07_e89be3c49a4a6b1bdfd5a75f4ba47ceb_cryptolocker.exe Avywuixyxmexxtr.exe PID 872 wrote to memory of 3480 872 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe PID 872 wrote to memory of 3480 872 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe PID 872 wrote to memory of 3480 872 Avywuixyxmexxtr.exe Avywuixyxmexxtr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-07_e89be3c49a4a6b1bdfd5a75f4ba47ceb_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-07_e89be3c49a4a6b1bdfd5a75f4ba47ceb_cryptolocker.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" "-rC:\Users\Admin\AppData\Local\Temp\2024-02-07_e89be3c49a4a6b1bdfd5a75f4ba47ceb_cryptolocker.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" -w2543⤵
- Executes dropped EXE
PID:3480
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
370KB
MD5e89be3c49a4a6b1bdfd5a75f4ba47ceb
SHA1e903d24265e56113706bfde379a6f2a6acb1851e
SHA256c6a557f58591a6cb419bf81687d42c922fcc4dd870873d8692c78e88c71caaec
SHA51234a2049345596e810b5a72e8141a7ec233f95d7639c09beab8d21c06cef5a1b6490491e447e3564cbefce05cd5d58807e898985a49819ad49e84d1e056163d0b