Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/02/2024, 13:33
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-24_540d6305fbb983cc8c4a7cc6d673e8e5_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-24_540d6305fbb983cc8c4a7cc6d673e8e5_cryptolocker.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-24_540d6305fbb983cc8c4a7cc6d673e8e5_cryptolocker.exe
-
Size
67KB
-
MD5
540d6305fbb983cc8c4a7cc6d673e8e5
-
SHA1
c71d3aac325f45c1d5e4ef5caeaa3c8f894d1b5a
-
SHA256
fbcb4d81df10db2d1579b7972caf1b5a7e8c02861dbb944c443982a64396c5ac
-
SHA512
70001a70cffc976f8b083d67afe34a71101f3e6a84d4fda7cd67859ff3a74229c4b51c28dfa93d71e212a0acb9410dd9a1aa8cee3b5c5b401ab997836e5f2e41
-
SSDEEP
1536:Dk/xY0sllyGQMOtEvwDpjwycDtKkQZQRKb61vSbgZ3QzNKU4S:DW60sllyWOtEvwDpjwF859
Malware Config
Signatures
-
Detection of CryptoLocker Variants 4 IoCs
resource yara_rule behavioral1/memory/1692-0-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000b000000012254-11.dat CryptoLocker_rule2 behavioral1/memory/2772-16-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_rule2 behavioral1/memory/1692-15-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 4 IoCs
resource yara_rule behavioral1/memory/1692-0-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_set1 behavioral1/files/0x000b000000012254-11.dat CryptoLocker_set1 behavioral1/memory/2772-16-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_set1 behavioral1/memory/1692-15-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2772 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1692 2024-02-24_540d6305fbb983cc8c4a7cc6d673e8e5_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1692 wrote to memory of 2772 1692 2024-02-24_540d6305fbb983cc8c4a7cc6d673e8e5_cryptolocker.exe 28 PID 1692 wrote to memory of 2772 1692 2024-02-24_540d6305fbb983cc8c4a7cc6d673e8e5_cryptolocker.exe 28 PID 1692 wrote to memory of 2772 1692 2024-02-24_540d6305fbb983cc8c4a7cc6d673e8e5_cryptolocker.exe 28 PID 1692 wrote to memory of 2772 1692 2024-02-24_540d6305fbb983cc8c4a7cc6d673e8e5_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-24_540d6305fbb983cc8c4a7cc6d673e8e5_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-24_540d6305fbb983cc8c4a7cc6d673e8e5_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD5ec954f130656c15fc601a0d6067c6732
SHA1c3fb7b19b4aa4e39b53b58f567e6a7b41ac8e14d
SHA256c11485f62a4ddf2212e96556adc08e0ed99f8209e2fb35992862a6211a5fa63b
SHA512e1a65a3a8b768b1a9ec63b7d0459518e49110bfa2cad659e6f58a2af2b1b5a3eb63088fe9de7e6743cfc22fd813805be2b126c96f75c1b9bff18114bcb857309