Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07-02-2024 09:01
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-07_86771976a99148ecd44c3033fe04e02c_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-07_86771976a99148ecd44c3033fe04e02c_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-07_86771976a99148ecd44c3033fe04e02c_cryptolocker.exe
-
Size
370KB
-
MD5
86771976a99148ecd44c3033fe04e02c
-
SHA1
8e692c3c6af7840eab6080ed26d011820318c5e2
-
SHA256
ba1a0c0e8d7887e73c5dc27466516ed96eb6ee5490a6977498f060e6cb5b05f5
-
SHA512
448e9d6f040d77aeb99616acd64ebe7ddad39eb70212ce15828babf8d7c6d3e6835f42447a854482d29b3103d33e2a96c97c4198db6406cb29f5bd1658b4efff
-
SSDEEP
6144:lHrjZhghBCLlsBxFJWCDA/tHHTdtlXvdWgTO3x5N22vWvLRKKAX5l++SyVISD:BZhghBCMxFJWCE/tHzh/FT85I2vCMX5V
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Deletes itself 1 IoCs
pid Process 3068 Avywuixyxmexxtr.exe -
Executes dropped EXE 2 IoCs
pid Process 3068 Avywuixyxmexxtr.exe 2728 Avywuixyxmexxtr.exe -
Loads dropped DLL 2 IoCs
pid Process 1168 2024-02-07_86771976a99148ecd44c3033fe04e02c_cryptolocker.exe 3068 Avywuixyxmexxtr.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\*CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1168 wrote to memory of 3068 1168 2024-02-07_86771976a99148ecd44c3033fe04e02c_cryptolocker.exe 28 PID 1168 wrote to memory of 3068 1168 2024-02-07_86771976a99148ecd44c3033fe04e02c_cryptolocker.exe 28 PID 1168 wrote to memory of 3068 1168 2024-02-07_86771976a99148ecd44c3033fe04e02c_cryptolocker.exe 28 PID 1168 wrote to memory of 3068 1168 2024-02-07_86771976a99148ecd44c3033fe04e02c_cryptolocker.exe 28 PID 3068 wrote to memory of 2728 3068 Avywuixyxmexxtr.exe 29 PID 3068 wrote to memory of 2728 3068 Avywuixyxmexxtr.exe 29 PID 3068 wrote to memory of 2728 3068 Avywuixyxmexxtr.exe 29 PID 3068 wrote to memory of 2728 3068 Avywuixyxmexxtr.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-07_86771976a99148ecd44c3033fe04e02c_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-07_86771976a99148ecd44c3033fe04e02c_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" "-rC:\Users\Admin\AppData\Local\Temp\2024-02-07_86771976a99148ecd44c3033fe04e02c_cryptolocker.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" -w1203⤵
- Executes dropped EXE
PID:2728
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
370KB
MD586771976a99148ecd44c3033fe04e02c
SHA18e692c3c6af7840eab6080ed26d011820318c5e2
SHA256ba1a0c0e8d7887e73c5dc27466516ed96eb6ee5490a6977498f060e6cb5b05f5
SHA512448e9d6f040d77aeb99616acd64ebe7ddad39eb70212ce15828babf8d7c6d3e6835f42447a854482d29b3103d33e2a96c97c4198db6406cb29f5bd1658b4efff