Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
17/02/2024, 09:54
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-17_ff51a1afb2284154a1d5366fe81e3e5e_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-17_ff51a1afb2284154a1d5366fe81e3e5e_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-17_ff51a1afb2284154a1d5366fe81e3e5e_cryptolocker.exe
-
Size
82KB
-
MD5
ff51a1afb2284154a1d5366fe81e3e5e
-
SHA1
5713bf8cfd45326fe3a540de62d771b32657a5fc
-
SHA256
a558e92ab010954a5b3a6a6e1b8b0e3b3bcbba4c867fde47bad9efc1642a6ad1
-
SHA512
d052832f8e121369d3c7e2b1e2a7c641f9f524ac7ca3eaa51ea6e0daf314fed2770804b99d12d6bd3846a9a74a24520e6d474e5089ddf6870645294be3bd82d3
-
SSDEEP
1536:V6QFElP6n+gMQMOtEvwDpjyaLccVNlVSLg:V6a+pOtEvwDpjvpV
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000a000000012262-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000a000000012262-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2236 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 3016 2024-02-17_ff51a1afb2284154a1d5366fe81e3e5e_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2236 3016 2024-02-17_ff51a1afb2284154a1d5366fe81e3e5e_cryptolocker.exe 28 PID 3016 wrote to memory of 2236 3016 2024-02-17_ff51a1afb2284154a1d5366fe81e3e5e_cryptolocker.exe 28 PID 3016 wrote to memory of 2236 3016 2024-02-17_ff51a1afb2284154a1d5366fe81e3e5e_cryptolocker.exe 28 PID 3016 wrote to memory of 2236 3016 2024-02-17_ff51a1afb2284154a1d5366fe81e3e5e_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-17_ff51a1afb2284154a1d5366fe81e3e5e_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-17_ff51a1afb2284154a1d5366fe81e3e5e_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD51e9bc54411f4b117324e8dd15cae4a88
SHA188ac7e91c8c11376a11088c24ea776c7725fe507
SHA25607de93fe4484f50aa0b1ecfb63e19322e7c46b314a9da05294fa85bb8a4e0bf8
SHA512581c4d12481d44d41bde3b9ffc9b3dd3bb8316d507cd7d67b6cd37b3776fb115c1bba6814041f117a38e3eed48e0d66a43a8949be919aa635d5dacee41973399