Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19-02-2024 17:39
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-19_ad2c5bf2abb453568eabd63cf284b255_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-19_ad2c5bf2abb453568eabd63cf284b255_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-19_ad2c5bf2abb453568eabd63cf284b255_cryptolocker.exe
-
Size
43KB
-
MD5
ad2c5bf2abb453568eabd63cf284b255
-
SHA1
9fb5c65fd2b6f37401d0fcdf01cf151684d59913
-
SHA256
3e6ea4d1f3f929632a341436abf9db646fb9780c25786b9ef76807cda1956004
-
SHA512
96ef8238c0c20c493ceeac20fd7c93d819b1d782bcbba877af5b87f1495c10b4e2e8373bd27409aee81564a1e92b84e9ca44512f79ac918996c6f2e6563681ee
-
SSDEEP
768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpj/MLam5aFr7YO6IL/:V6QFElP6n+gMQMOtEvwDpjyaYaFAz6
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000b00000001226e-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000b00000001226e-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2404 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2256 2024-02-19_ad2c5bf2abb453568eabd63cf284b255_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2404 2256 2024-02-19_ad2c5bf2abb453568eabd63cf284b255_cryptolocker.exe 28 PID 2256 wrote to memory of 2404 2256 2024-02-19_ad2c5bf2abb453568eabd63cf284b255_cryptolocker.exe 28 PID 2256 wrote to memory of 2404 2256 2024-02-19_ad2c5bf2abb453568eabd63cf284b255_cryptolocker.exe 28 PID 2256 wrote to memory of 2404 2256 2024-02-19_ad2c5bf2abb453568eabd63cf284b255_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-19_ad2c5bf2abb453568eabd63cf284b255_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-19_ad2c5bf2abb453568eabd63cf284b255_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD5d5a2a26409d10ffb0fb4b7c6bfbe6e37
SHA15805ebe42e621b06f26cbd3ca86dc71372e002f3
SHA2560ed39b7fa665f499e29e1b74f258e1f7f40c5bd5c7d74d1ea427195c3635002a
SHA512c898cfe49f329b18c5dd1485a152afc5184f61de4f1651b8f4d12082548ef5f800084270a3c0fd675bdd2e52b432d8858e5c6273891badea9c98db0de81109eb