Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18-02-2024 16:51
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-18_ecb92fbe76dbe69362cc722483823b13_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-18_ecb92fbe76dbe69362cc722483823b13_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-18_ecb92fbe76dbe69362cc722483823b13_cryptolocker.exe
-
Size
41KB
-
MD5
ecb92fbe76dbe69362cc722483823b13
-
SHA1
f43513d6eb342855bb69bcd16855f348b72dc537
-
SHA256
5193d2db63a22cfe309e94260169f70f920df0ac9d3aeccc46447816ffdcabc7
-
SHA512
b9d1bbd64163ccec2f19031fa505d49ef69a0a66a0e3c0410fba504b072b99665a8c648b02f97d7729dc152709658e6463c09b8f71154ccab68e61538a8dc2bd
-
SSDEEP
768:b/yC4GyNM01GuQMNXw2PSjHPbSuYlW8PAaW:b/pYayGig5HjS3NPA1
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x0008000000012270-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2792 retln.exe -
Loads dropped DLL 1 IoCs
pid Process 2184 2024-02-18_ecb92fbe76dbe69362cc722483823b13_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2184 2024-02-18_ecb92fbe76dbe69362cc722483823b13_cryptolocker.exe 2792 retln.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2792 2184 2024-02-18_ecb92fbe76dbe69362cc722483823b13_cryptolocker.exe 28 PID 2184 wrote to memory of 2792 2184 2024-02-18_ecb92fbe76dbe69362cc722483823b13_cryptolocker.exe 28 PID 2184 wrote to memory of 2792 2184 2024-02-18_ecb92fbe76dbe69362cc722483823b13_cryptolocker.exe 28 PID 2184 wrote to memory of 2792 2184 2024-02-18_ecb92fbe76dbe69362cc722483823b13_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-18_ecb92fbe76dbe69362cc722483823b13_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-18_ecb92fbe76dbe69362cc722483823b13_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\retln.exe"C:\Users\Admin\AppData\Local\Temp\retln.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5c7b676e3b83b01c7a0b8b971534951bd
SHA1f77ce5d87f3f642212c82524326a340fa7edb3a3
SHA2560da075220ada2a94e3e7c4976325557e498c526495baf862ff23c63903bd5167
SHA5126edbbeb6a82ced6a5401f303798699ef167f2a860e30f16975169acbbd5d2c0102e60953cb491ec2e0734cf91fec4eb4b01c611efc1fb02c8a273dc7621b5364