Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
23-02-2024 20:54
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-23_d40b50ba78ffa063f3e444546e5e2dc4_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-02-23_d40b50ba78ffa063f3e444546e5e2dc4_cryptolocker.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-23_d40b50ba78ffa063f3e444546e5e2dc4_cryptolocker.exe
-
Size
34KB
-
MD5
d40b50ba78ffa063f3e444546e5e2dc4
-
SHA1
26023ef9a864f745c0c71f9760b05867a6959ab8
-
SHA256
9f8711a99f849daa532f2a780dd7b4ce4c15c43833ce2c5bfbb29ea0ae341ad6
-
SHA512
17f8d3b169ad36c89259fe48493035781de4207d09e8ac77d04eacbeee885a05c751aa83e1a767cd31df53f953617fe886f92b3bffbed07596799734694723a1
-
SSDEEP
384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSzn1KkZQYfI:b/yC4GyNM01GuQMNXw2PSj1POV
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000c000000012331-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2984 retln.exe -
Loads dropped DLL 1 IoCs
pid Process 2348 2024-02-23_d40b50ba78ffa063f3e444546e5e2dc4_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2348 2024-02-23_d40b50ba78ffa063f3e444546e5e2dc4_cryptolocker.exe 2984 retln.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2984 2348 2024-02-23_d40b50ba78ffa063f3e444546e5e2dc4_cryptolocker.exe 28 PID 2348 wrote to memory of 2984 2348 2024-02-23_d40b50ba78ffa063f3e444546e5e2dc4_cryptolocker.exe 28 PID 2348 wrote to memory of 2984 2348 2024-02-23_d40b50ba78ffa063f3e444546e5e2dc4_cryptolocker.exe 28 PID 2348 wrote to memory of 2984 2348 2024-02-23_d40b50ba78ffa063f3e444546e5e2dc4_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-23_d40b50ba78ffa063f3e444546e5e2dc4_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-23_d40b50ba78ffa063f3e444546e5e2dc4_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\retln.exe"C:\Users\Admin\AppData\Local\Temp\retln.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD542b3e8d5be9cd7b9855a014c856d500c
SHA1b6154c7a8bd4d5580bedcb27acbca57004a167be
SHA2562e493fbfe7f9702c4c1f4dc428cdcea98d97be8c094e7c9b97f83e312d3bf78d
SHA512f973a0073a30eec83393eb5a1725961a4004951c58ca4c810da5b0aaee0930013c81123e65d9423d60915c6b929c91de23e8059c4ca32f995f5fc5237392ba77