Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07-02-2024 09:01
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-07_86771976a99148ecd44c3033fe04e02c_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-07_86771976a99148ecd44c3033fe04e02c_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-07_86771976a99148ecd44c3033fe04e02c_cryptolocker.exe
-
Size
370KB
-
MD5
86771976a99148ecd44c3033fe04e02c
-
SHA1
8e692c3c6af7840eab6080ed26d011820318c5e2
-
SHA256
ba1a0c0e8d7887e73c5dc27466516ed96eb6ee5490a6977498f060e6cb5b05f5
-
SHA512
448e9d6f040d77aeb99616acd64ebe7ddad39eb70212ce15828babf8d7c6d3e6835f42447a854482d29b3103d33e2a96c97c4198db6406cb29f5bd1658b4efff
-
SSDEEP
6144:lHrjZhghBCLlsBxFJWCDA/tHHTdtlXvdWgTO3x5N22vWvLRKKAX5l++SyVISD:BZhghBCMxFJWCE/tHzh/FT85I2vCMX5V
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Deletes itself 1 IoCs
pid Process 1592 Avywuixyxmexxtr.exe -
Executes dropped EXE 2 IoCs
pid Process 1592 Avywuixyxmexxtr.exe 4888 Avywuixyxmexxtr.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\*CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5024 wrote to memory of 1592 5024 2024-02-07_86771976a99148ecd44c3033fe04e02c_cryptolocker.exe 84 PID 5024 wrote to memory of 1592 5024 2024-02-07_86771976a99148ecd44c3033fe04e02c_cryptolocker.exe 84 PID 5024 wrote to memory of 1592 5024 2024-02-07_86771976a99148ecd44c3033fe04e02c_cryptolocker.exe 84 PID 1592 wrote to memory of 4888 1592 Avywuixyxmexxtr.exe 85 PID 1592 wrote to memory of 4888 1592 Avywuixyxmexxtr.exe 85 PID 1592 wrote to memory of 4888 1592 Avywuixyxmexxtr.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-07_86771976a99148ecd44c3033fe04e02c_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-07_86771976a99148ecd44c3033fe04e02c_cryptolocker.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" "-rC:\Users\Admin\AppData\Local\Temp\2024-02-07_86771976a99148ecd44c3033fe04e02c_cryptolocker.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" -w2283⤵
- Executes dropped EXE
PID:4888
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
370KB
MD586771976a99148ecd44c3033fe04e02c
SHA18e692c3c6af7840eab6080ed26d011820318c5e2
SHA256ba1a0c0e8d7887e73c5dc27466516ed96eb6ee5490a6977498f060e6cb5b05f5
SHA512448e9d6f040d77aeb99616acd64ebe7ddad39eb70212ce15828babf8d7c6d3e6835f42447a854482d29b3103d33e2a96c97c4198db6406cb29f5bd1658b4efff