Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
22-02-2024 06:55
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-22_e46d1e525f79f8dd4c21fc660375f940_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-02-22_e46d1e525f79f8dd4c21fc660375f940_cryptolocker.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-22_e46d1e525f79f8dd4c21fc660375f940_cryptolocker.exe
-
Size
82KB
-
MD5
e46d1e525f79f8dd4c21fc660375f940
-
SHA1
4c36a2d8979cab0c09a85ac3d72c2f4ed0d2417b
-
SHA256
25917ff8d4560910b05d9f60876744d418bec40fcd62a4c98624fe785e851c7b
-
SHA512
3b5fbdca032940b00f64ff930c5a5e526783709b01a20c2c0c9297f8caf2f4ab7f557917d4e35b4156aba13fed127d403d0d3850813065068bafec503bf3ea46
-
SSDEEP
1536:V6QFElP6n+gMQMOtEvwDpjyaLccVNlVSLX:V6a+pOtEvwDpjvp+
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000b000000013ab9-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000b000000013ab9-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 1032 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2932 2024-02-22_e46d1e525f79f8dd4c21fc660375f940_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2932 wrote to memory of 1032 2932 2024-02-22_e46d1e525f79f8dd4c21fc660375f940_cryptolocker.exe 28 PID 2932 wrote to memory of 1032 2932 2024-02-22_e46d1e525f79f8dd4c21fc660375f940_cryptolocker.exe 28 PID 2932 wrote to memory of 1032 2932 2024-02-22_e46d1e525f79f8dd4c21fc660375f940_cryptolocker.exe 28 PID 2932 wrote to memory of 1032 2932 2024-02-22_e46d1e525f79f8dd4c21fc660375f940_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-22_e46d1e525f79f8dd4c21fc660375f940_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-22_e46d1e525f79f8dd4c21fc660375f940_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:1032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5be4f634d771cc1a4931c113ce7494747
SHA113ac511fd442a1630c6897d3f53ebd1741e4b0e8
SHA256d1ab0c0a635837461f06b4fa784955352123e2b1802ee58c4413390261d67ca7
SHA512d4b50d56563ba0cbd4656f083fcae63f3a2a9f0b37bb9eebadffbac27495f24f62a4d8ec6e70edbf69bf53f279341c9fe81cd74fb849ec3ed0e8df8c8f437828