Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12-02-2024 14:48
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-12_dff6b09dfcf7518d734ca08e02acf05e_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-12_dff6b09dfcf7518d734ca08e02acf05e_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-12_dff6b09dfcf7518d734ca08e02acf05e_cryptolocker.exe
-
Size
69KB
-
MD5
dff6b09dfcf7518d734ca08e02acf05e
-
SHA1
ca80d0dafc4f178d57162d0d5c776a08232c9169
-
SHA256
ba8a3b3b4f89f221dd4276f22140925ffe0f0bdcba33e9c198d8f28db76efee2
-
SHA512
3e1f8a7b1410c5b3d30926590f0a20d749194dbf229db9290754403144de120a93023784b4156da9e8d96bf2e8ee7aba5512b09b2369f7aceb24c0f773a32c33
-
SSDEEP
1536:Dk/xY0sllyGQMOtEvwDpjwycDtKkQZQRKb61vSbgZ3QzNKUl:DW60sllyWOtEvwDpjwF85r
Malware Config
Signatures
-
Detection of CryptoLocker Variants 4 IoCs
resource yara_rule behavioral1/memory/1628-0-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x0009000000012257-11.dat CryptoLocker_rule2 behavioral1/memory/1628-15-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2376-17-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 4 IoCs
resource yara_rule behavioral1/memory/1628-0-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_set1 behavioral1/files/0x0009000000012257-11.dat CryptoLocker_set1 behavioral1/memory/1628-15-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_set1 behavioral1/memory/2376-17-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2376 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1628 2024-02-12_dff6b09dfcf7518d734ca08e02acf05e_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1628 wrote to memory of 2376 1628 2024-02-12_dff6b09dfcf7518d734ca08e02acf05e_cryptolocker.exe 28 PID 1628 wrote to memory of 2376 1628 2024-02-12_dff6b09dfcf7518d734ca08e02acf05e_cryptolocker.exe 28 PID 1628 wrote to memory of 2376 1628 2024-02-12_dff6b09dfcf7518d734ca08e02acf05e_cryptolocker.exe 28 PID 1628 wrote to memory of 2376 1628 2024-02-12_dff6b09dfcf7518d734ca08e02acf05e_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-12_dff6b09dfcf7518d734ca08e02acf05e_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-12_dff6b09dfcf7518d734ca08e02acf05e_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69KB
MD51927a2e4e1228bcae4bf4095af95907e
SHA13fcfc4331d426df9dac9c920cb079bd1f0906940
SHA256b589c2d66fb9d525907d99a05d7d5a594818e0647ca5d4a3ebbee42d6bd62952
SHA5123d9e29d537293e075a7238e4abb76239e4808aa48ce89cafb570c70ad105d99fa28def315f79c489154907c68a03bd7371b7bca45af82b213b89e7b4fe822d7e