Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 04:54
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-13_6a4c8d6ac20388fd061c7f6db9a8437b_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-02-13_6a4c8d6ac20388fd061c7f6db9a8437b_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-13_6a4c8d6ac20388fd061c7f6db9a8437b_cryptolocker.exe
-
Size
37KB
-
MD5
6a4c8d6ac20388fd061c7f6db9a8437b
-
SHA1
91c496af865ee3c113a471af0ff6a5a4ca23636a
-
SHA256
bf7261febfb6f3450c28b74e8a819b64cfe933a7be5972a5c1cb05974c9ca7a0
-
SHA512
5fd1b076e6097c764e2e75aa80ca057ec5f3e2b5457895add6b4627237e1740c72d110bf7ef471a8b49d71e2beb81b5c3b9bf1bd27860e6fd5189e9f33b6d97c
-
SSDEEP
768:bxNQIE0eBhkL2Fo1CCwgfjOg1tsJ6zeen7JEgx3O/:bxNrC7kYo1Fxf3s06gY/
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000a000000015626-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 3004 pissa.exe -
Loads dropped DLL 1 IoCs
pid Process 2232 2024-02-13_6a4c8d6ac20388fd061c7f6db9a8437b_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 3004 2232 2024-02-13_6a4c8d6ac20388fd061c7f6db9a8437b_cryptolocker.exe 28 PID 2232 wrote to memory of 3004 2232 2024-02-13_6a4c8d6ac20388fd061c7f6db9a8437b_cryptolocker.exe 28 PID 2232 wrote to memory of 3004 2232 2024-02-13_6a4c8d6ac20388fd061c7f6db9a8437b_cryptolocker.exe 28 PID 2232 wrote to memory of 3004 2232 2024-02-13_6a4c8d6ac20388fd061c7f6db9a8437b_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_6a4c8d6ac20388fd061c7f6db9a8437b_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-13_6a4c8d6ac20388fd061c7f6db9a8437b_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\pissa.exe"C:\Users\Admin\AppData\Local\Temp\pissa.exe"2⤵
- Executes dropped EXE
PID:3004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD554b4902506544661277c552292cea67e
SHA13c1def335d5b493fc80eec6aa290b580ab6666c8
SHA256a75defae704656c39fe04344654429c504216d4549bb6581e27b0f28d5a522f2
SHA512175f473818e06d1874edecf808d29d341bfdfa9bcd5df57a6d9c4355535271b133736fa19f4718846aef961fea0a62c7fc8f970cd52f08ac9b20564d283b0cd4