Analysis
-
max time kernel
601s -
max time network
606s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08-02-2024 19:01
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-07_e89be3c49a4a6b1bdfd5a75f4ba47ceb_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-07_e89be3c49a4a6b1bdfd5a75f4ba47ceb_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-07_e89be3c49a4a6b1bdfd5a75f4ba47ceb_cryptolocker.exe
-
Size
370KB
-
MD5
e89be3c49a4a6b1bdfd5a75f4ba47ceb
-
SHA1
e903d24265e56113706bfde379a6f2a6acb1851e
-
SHA256
c6a557f58591a6cb419bf81687d42c922fcc4dd870873d8692c78e88c71caaec
-
SHA512
34a2049345596e810b5a72e8141a7ec233f95d7639c09beab8d21c06cef5a1b6490491e447e3564cbefce05cd5d58807e898985a49819ad49e84d1e056163d0b
-
SSDEEP
6144:lHrjZhghBCLlsBxFJWCDA/tHHTdrXvdWgTO3x5N22vWvLRKKAX5l++SyVISD:BZhghBCMxFJWCE/tHz9/FT85I2vCMX5V
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Deletes itself 1 IoCs
pid Process 3404 Avywuixyxmexxtr.exe -
Executes dropped EXE 2 IoCs
pid Process 3404 Avywuixyxmexxtr.exe 3784 Avywuixyxmexxtr.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\*CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5004 wrote to memory of 3404 5004 2024-02-07_e89be3c49a4a6b1bdfd5a75f4ba47ceb_cryptolocker.exe 82 PID 5004 wrote to memory of 3404 5004 2024-02-07_e89be3c49a4a6b1bdfd5a75f4ba47ceb_cryptolocker.exe 82 PID 5004 wrote to memory of 3404 5004 2024-02-07_e89be3c49a4a6b1bdfd5a75f4ba47ceb_cryptolocker.exe 82 PID 3404 wrote to memory of 3784 3404 Avywuixyxmexxtr.exe 83 PID 3404 wrote to memory of 3784 3404 Avywuixyxmexxtr.exe 83 PID 3404 wrote to memory of 3784 3404 Avywuixyxmexxtr.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-07_e89be3c49a4a6b1bdfd5a75f4ba47ceb_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-07_e89be3c49a4a6b1bdfd5a75f4ba47ceb_cryptolocker.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" "-rC:\Users\Admin\AppData\Local\Temp\2024-02-07_e89be3c49a4a6b1bdfd5a75f4ba47ceb_cryptolocker.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" -w2543⤵
- Executes dropped EXE
PID:3784
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
370KB
MD5e89be3c49a4a6b1bdfd5a75f4ba47ceb
SHA1e903d24265e56113706bfde379a6f2a6acb1851e
SHA256c6a557f58591a6cb419bf81687d42c922fcc4dd870873d8692c78e88c71caaec
SHA51234a2049345596e810b5a72e8141a7ec233f95d7639c09beab8d21c06cef5a1b6490491e447e3564cbefce05cd5d58807e898985a49819ad49e84d1e056163d0b