Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22/02/2024, 13:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-22_45606eb26109822afd64b2502f823ce4_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-22_45606eb26109822afd64b2502f823ce4_cryptolocker.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-22_45606eb26109822afd64b2502f823ce4_cryptolocker.exe
-
Size
32KB
-
MD5
45606eb26109822afd64b2502f823ce4
-
SHA1
ccc1c9465907b4d13e17c915cd20410210045795
-
SHA256
72e30c5180d76d5395562fb99fdba4a60c07f2de7f452e35bdbbe65f3c45964b
-
SHA512
5e08a17ab69d941bf67ea26be104f39fee6420e5db89eefd984719b0865a3741e3c425615bee9c1384c5d3d5741800946e7907c8c45ea58887745e9f659c24cc
-
SSDEEP
384:bmM0V/YPvnr801TRoUGPh4TKt6ATt1DqgPa3s/zzoCt9/B+OOR8X:b7o/2n1TCraU6GD1a4Xt9hO8X
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000a000000012264-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2532 rewok.exe -
Loads dropped DLL 1 IoCs
pid Process 1348 2024-02-22_45606eb26109822afd64b2502f823ce4_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1348 2024-02-22_45606eb26109822afd64b2502f823ce4_cryptolocker.exe 2532 rewok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1348 wrote to memory of 2532 1348 2024-02-22_45606eb26109822afd64b2502f823ce4_cryptolocker.exe 28 PID 1348 wrote to memory of 2532 1348 2024-02-22_45606eb26109822afd64b2502f823ce4_cryptolocker.exe 28 PID 1348 wrote to memory of 2532 1348 2024-02-22_45606eb26109822afd64b2502f823ce4_cryptolocker.exe 28 PID 1348 wrote to memory of 2532 1348 2024-02-22_45606eb26109822afd64b2502f823ce4_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-22_45606eb26109822afd64b2502f823ce4_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-22_45606eb26109822afd64b2502f823ce4_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\rewok.exe"C:\Users\Admin\AppData\Local\Temp\rewok.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5e9de2e706c7ac8342a05a50ab6c9d29f
SHA1e8289aac5e80030003d3488484dfc5b0f952859c
SHA25608cf13cfc8df2741f07099f91c6d7d7b638119e4c5e472abb4fc546e5556d17d
SHA5123b8a432c6849e63807ef2d5cee02eab9f24ed50cec63431c4fb6ee244544f15302b88fda988c7bd7741bf0dcd2e83287f2b46c0b1edf16f9f819e05b8cac8813