Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22/02/2024, 09:03
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-22_286d62811657d85688a298d1d33ea1c0_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-22_286d62811657d85688a298d1d33ea1c0_cryptolocker.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-22_286d62811657d85688a298d1d33ea1c0_cryptolocker.exe
-
Size
161KB
-
MD5
286d62811657d85688a298d1d33ea1c0
-
SHA1
f440225404d4d49cf94221e3355819214b47e09f
-
SHA256
5354cdc24def6ff04720520a701cd775e64b61fa2d524d6165916de965b68018
-
SHA512
7080e9107d75b597b253c1f81777f4a593eba5490a81bb9710984b2b53812b67bd53d31655c4d5017156bea43f3c7e6cbe7aba6f1928b71d91099d358088c661
-
SSDEEP
1536:u6QFElP6n+gWMOtEvwDpjJGYQbN/PKwNgp699GNtL1euPa:u6a++OtEvwDpj6zf
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000b00000001332e-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000b00000001332e-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2256 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1968 2024-02-22_286d62811657d85688a298d1d33ea1c0_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2256 1968 2024-02-22_286d62811657d85688a298d1d33ea1c0_cryptolocker.exe 28 PID 1968 wrote to memory of 2256 1968 2024-02-22_286d62811657d85688a298d1d33ea1c0_cryptolocker.exe 28 PID 1968 wrote to memory of 2256 1968 2024-02-22_286d62811657d85688a298d1d33ea1c0_cryptolocker.exe 28 PID 1968 wrote to memory of 2256 1968 2024-02-22_286d62811657d85688a298d1d33ea1c0_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-22_286d62811657d85688a298d1d33ea1c0_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-22_286d62811657d85688a298d1d33ea1c0_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2256
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
161KB
MD522232b02fcf8281ce0502030b82d316e
SHA1afde447c7f1e3885a844656b74a39e1a60988c8f
SHA256478c10e9262c69817bbbc46ee78185e8e662431d3418e9b371421919a59cd9ca
SHA5121dd53effa27453e3a1e1457b1b31aa0f4e80b012077e579df4f20f825f40a7e9aa2eeb6b0d78542c0a7cf9c1146027c0c47453feacd6c758441a5d5754d75de3