Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
21/02/2024, 11:40
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-21_9da8be0bdc10b2462d5bafb7ff2980fc_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-21_9da8be0bdc10b2462d5bafb7ff2980fc_cryptolocker.exe
Resource
win10v2004-20240220-en
General
-
Target
2024-02-21_9da8be0bdc10b2462d5bafb7ff2980fc_cryptolocker.exe
-
Size
35KB
-
MD5
9da8be0bdc10b2462d5bafb7ff2980fc
-
SHA1
55adef05ad6b20b27068602d9611d6c8debf89cd
-
SHA256
933a3b8a09320f9be9cab6067c9f56bec0ffb2357ba36332be5b1d8029b05723
-
SHA512
14ab33b68c766ab711a297d7a55c101dc26d5ebb8246e4abc2a44b225cacba5d615d8dc3daba2cb291d0e9b41904fb95437af923667915f06a0d09e2fc526e81
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBVajSKm5uhy7O4JQ:X6QFElP6n+gJQMOtEvwDpjBcSKm5uhw6
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000e00000001224c-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000e00000001224c-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2884 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2368 2024-02-21_9da8be0bdc10b2462d5bafb7ff2980fc_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2884 2368 2024-02-21_9da8be0bdc10b2462d5bafb7ff2980fc_cryptolocker.exe 28 PID 2368 wrote to memory of 2884 2368 2024-02-21_9da8be0bdc10b2462d5bafb7ff2980fc_cryptolocker.exe 28 PID 2368 wrote to memory of 2884 2368 2024-02-21_9da8be0bdc10b2462d5bafb7ff2980fc_cryptolocker.exe 28 PID 2368 wrote to memory of 2884 2368 2024-02-21_9da8be0bdc10b2462d5bafb7ff2980fc_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-21_9da8be0bdc10b2462d5bafb7ff2980fc_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-21_9da8be0bdc10b2462d5bafb7ff2980fc_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD545528b2fd71a07c44b9c1c300545c068
SHA1cf17f087f831b583dbcb6320f75f8db862459f3f
SHA2561db6c67a0a17fbb45601ece046b7c9eb97dc4e6d612471042dc9d9edefe6236c
SHA5125c31d7615d627f7a26ee0a7abd4054850b53f558c19f3c92b218b4feee9969d58f70896feabb45d2cea5cbb9115b5e21384e6c36a5d0b4ac8ea760ccc9156a78