Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14/02/2024, 17:51
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-14_fec22acd2c9cceb6d243977502816afd_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-14_fec22acd2c9cceb6d243977502816afd_cryptolocker.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-02-14_fec22acd2c9cceb6d243977502816afd_cryptolocker.exe
-
Size
41KB
-
MD5
fec22acd2c9cceb6d243977502816afd
-
SHA1
ef2f6527c5dab469507469971cd8e47fda0bb8e9
-
SHA256
e3c6ea35e3c9e202cea4782fab80f84ec84d7284fd5a39a63178b9f598fb151d
-
SHA512
4ad4767ffb171592815cc3d55a03da91d37f74506fdb079f455214bbeecdd417d8989685b44af0b61c008ebfaa0748e8f1f549ef8550122e2425496b9580dc7f
-
SSDEEP
768:b/yC4GyNM01GuQMNXw2PSjHPbSuYlW8PAsF:b/pYayGig5HjS3NPAsF
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000b000000012238-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2808 retln.exe -
Loads dropped DLL 1 IoCs
pid Process 2780 2024-02-14_fec22acd2c9cceb6d243977502816afd_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2780 2024-02-14_fec22acd2c9cceb6d243977502816afd_cryptolocker.exe 2808 retln.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2808 2780 2024-02-14_fec22acd2c9cceb6d243977502816afd_cryptolocker.exe 28 PID 2780 wrote to memory of 2808 2780 2024-02-14_fec22acd2c9cceb6d243977502816afd_cryptolocker.exe 28 PID 2780 wrote to memory of 2808 2780 2024-02-14_fec22acd2c9cceb6d243977502816afd_cryptolocker.exe 28 PID 2780 wrote to memory of 2808 2780 2024-02-14_fec22acd2c9cceb6d243977502816afd_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-14_fec22acd2c9cceb6d243977502816afd_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-14_fec22acd2c9cceb6d243977502816afd_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\retln.exe"C:\Users\Admin\AppData\Local\Temp\retln.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5486debc12c28b625edd452322b0ff530
SHA162733399f9539175f41b36f4e9593e68ef1b9f99
SHA2567567029ef289502626d9827490288576b6ae5c84609c24024adac4452c1360cc
SHA5123520a58c7923022da5dce6244be8d7a4270031ba8bf186581099e4b386631701bae16938b7e0c328654c900a7c1d779f31d1ecf19a369f0bbe6437c3a2ce144d