Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
17/02/2024, 23:38
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-17_d1abcd90da09ab6cd0af47bbd22d5675_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-17_d1abcd90da09ab6cd0af47bbd22d5675_cryptolocker.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-02-17_d1abcd90da09ab6cd0af47bbd22d5675_cryptolocker.exe
-
Size
44KB
-
MD5
d1abcd90da09ab6cd0af47bbd22d5675
-
SHA1
67c6650776f408243a1c172c641039a3eeb25ff7
-
SHA256
7675ac27c8bb7ff016a734210c004ff040183704179d954679faa3721ac75105
-
SHA512
0d6933c6620d28c2a47ee01dea8c7abbd8b3c2a4c9bda441a1a6c12e9d487643cf85c46b0335a9d8e613b9327c15f4243df62feff86a525753488a3dc0f1cd5a
-
SSDEEP
768:wHGGaSawqnwjRQ6ESlmFOsPoOdQtOOtEvwDpjm6j4AYsqSh+DETkedm+YUS5I7xt:YGzl5wjRQBBOsP1QMOtEvwDpjl39+D+P
Malware Config
Signatures
-
Detection of CryptoLocker Variants 4 IoCs
resource yara_rule behavioral1/memory/2224-0-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000c000000012252-11.dat CryptoLocker_rule2 behavioral1/memory/2224-16-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_rule2 behavioral1/memory/1884-17-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 4 IoCs
resource yara_rule behavioral1/memory/2224-0-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_set1 behavioral1/files/0x000c000000012252-11.dat CryptoLocker_set1 behavioral1/memory/2224-16-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_set1 behavioral1/memory/1884-17-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 1884 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2224 2024-02-17_d1abcd90da09ab6cd0af47bbd22d5675_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2224 wrote to memory of 1884 2224 2024-02-17_d1abcd90da09ab6cd0af47bbd22d5675_cryptolocker.exe 28 PID 2224 wrote to memory of 1884 2224 2024-02-17_d1abcd90da09ab6cd0af47bbd22d5675_cryptolocker.exe 28 PID 2224 wrote to memory of 1884 2224 2024-02-17_d1abcd90da09ab6cd0af47bbd22d5675_cryptolocker.exe 28 PID 2224 wrote to memory of 1884 2224 2024-02-17_d1abcd90da09ab6cd0af47bbd22d5675_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-17_d1abcd90da09ab6cd0af47bbd22d5675_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-17_d1abcd90da09ab6cd0af47bbd22d5675_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:1884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD544f5f54417aa97b4146c502a9b766460
SHA16fa06ae526fd79c47b7ee68cb488749928bd95a4
SHA256e76108bb9c51dd1698ff7dbe99b86a93b6d0cd2e4f60f34382b322edd72e89d9
SHA51249476be5be1a6a1d8556e504ebc77545a849741f11e8bc25e96611c93bcfff45f670815f6aac936199fa951e89f7c0e85900d62fcc301e06c075472ed9749f7c