Analysis
-
max time kernel
122s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/02/2024, 16:40
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-19_85f149ceccbb32446d41875db4652d30_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-19_85f149ceccbb32446d41875db4652d30_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-19_85f149ceccbb32446d41875db4652d30_cryptolocker.exe
-
Size
40KB
-
MD5
85f149ceccbb32446d41875db4652d30
-
SHA1
341c9e4e976e7442a56be1029cf5aab566e77e92
-
SHA256
14e58d2e7f8608016029d92e7fff6ec542c28c640119072d26d208d078324b0e
-
SHA512
8b8d0403636df3b9cd7fe7bfc9f22b54e5f0ca1b79c0a60a6cf31c115064c35aafdae1143b7adb6666ee9eed0dae4d4eb6e8c350cf97c7b47dbe414a21bb9d2a
-
SSDEEP
768:b/yC4GyNM01GuQMNXw2PSjHPbSuYlW8PA9Dm:b/pYayGig5HjS3NPA9Dm
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x0009000000012252-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2728 retln.exe -
Loads dropped DLL 1 IoCs
pid Process 2672 2024-02-19_85f149ceccbb32446d41875db4652d30_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2672 2024-02-19_85f149ceccbb32446d41875db4652d30_cryptolocker.exe 2728 retln.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2728 2672 2024-02-19_85f149ceccbb32446d41875db4652d30_cryptolocker.exe 28 PID 2672 wrote to memory of 2728 2672 2024-02-19_85f149ceccbb32446d41875db4652d30_cryptolocker.exe 28 PID 2672 wrote to memory of 2728 2672 2024-02-19_85f149ceccbb32446d41875db4652d30_cryptolocker.exe 28 PID 2672 wrote to memory of 2728 2672 2024-02-19_85f149ceccbb32446d41875db4652d30_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-19_85f149ceccbb32446d41875db4652d30_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-19_85f149ceccbb32446d41875db4652d30_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\retln.exe"C:\Users\Admin\AppData\Local\Temp\retln.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5d0ae42076ac90a047476148dd9b775fa
SHA15d89c7e54e74694623b2247d71ba59a901bbb52d
SHA256f7140a492ac96d36b0fabd4db5296636eb2ef53fb569002e8b8328f62237286f
SHA512306a7daae02def09b4fe136c37b4c6a6c01895abdd31f8fb00344beda043b11b4ea095357c25cccb9490fdcae57b4512269158784c9e47d9314fbe9135a9f02d