Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
20/02/2024, 15:02
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-20_c207b59cdb7f5197ef2c763de986f335_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-20_c207b59cdb7f5197ef2c763de986f335_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-20_c207b59cdb7f5197ef2c763de986f335_cryptolocker.exe
-
Size
58KB
-
MD5
c207b59cdb7f5197ef2c763de986f335
-
SHA1
b826978200f7e712e465063bc8b72690baf26de0
-
SHA256
220fd00b02a7c556b538f68e477eaac0ef725349a14bca76cd33d5ecf254b8a9
-
SHA512
33302fa5ef431b3105182d5fc3b0919535b020867a4572528fb69d2eac81433e58ea4e3e97904f81329e4783553c709bbb265831bfc108deeb8406364b1fc7a6
-
SSDEEP
768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpj/MLa5VccPt547/qm3ME:V6QFElP6n+gMQMOtEvwDpjyaLccVCbDf
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000c0000000122dc-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000c0000000122dc-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2752 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2336 2024-02-20_c207b59cdb7f5197ef2c763de986f335_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2752 2336 2024-02-20_c207b59cdb7f5197ef2c763de986f335_cryptolocker.exe 28 PID 2336 wrote to memory of 2752 2336 2024-02-20_c207b59cdb7f5197ef2c763de986f335_cryptolocker.exe 28 PID 2336 wrote to memory of 2752 2336 2024-02-20_c207b59cdb7f5197ef2c763de986f335_cryptolocker.exe 28 PID 2336 wrote to memory of 2752 2336 2024-02-20_c207b59cdb7f5197ef2c763de986f335_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-20_c207b59cdb7f5197ef2c763de986f335_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-20_c207b59cdb7f5197ef2c763de986f335_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD517c525a6320cd6c8f5534c81b598ee27
SHA1024d038cfd729206d50b4d8519bdd1586eba5867
SHA25657d77976d8520015cbdc4d85d2f12fbb8f3021d12156b7aab953738bc7f43b8a
SHA5127a2f39c495e6081ebae54f56f3dd2820fd2c5c81dd0912e5a57641ab8e8603515a425f63bd35fc234af0c4bb58f87d5bba581d1a95031bd1c6fe821fad60e0a7