Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/02/2024, 05:08
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-25_c192ef7aec1823ef849b053102c2ee35_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-25_c192ef7aec1823ef849b053102c2ee35_cryptolocker.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-25_c192ef7aec1823ef849b053102c2ee35_cryptolocker.exe
-
Size
53KB
-
MD5
c192ef7aec1823ef849b053102c2ee35
-
SHA1
770e0dc9ab03dec2bff8ceac8ccd6d6cb0fbefab
-
SHA256
0959ccceead632e1184c188651a0f7efcdff62872b123a1de295edaf8d1eccea
-
SHA512
3536eabbe83df3c94dc82a537bb624670f72b8646051a93e3c2fbeee59d5ca07c2087e28b83806a49355b602c9530043780680bf4176498ec931d324a282485e
-
SSDEEP
768:bIDOw9UiaCHfjnE0Sfa7ilR0p9u6p4ICNBCXK9XbTbmhTT:bIDOw9a0DwitDZzcTe
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000c000000012254-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 1680 lossy.exe -
Loads dropped DLL 1 IoCs
pid Process 1632 2024-02-25_c192ef7aec1823ef849b053102c2ee35_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1632 wrote to memory of 1680 1632 2024-02-25_c192ef7aec1823ef849b053102c2ee35_cryptolocker.exe 28 PID 1632 wrote to memory of 1680 1632 2024-02-25_c192ef7aec1823ef849b053102c2ee35_cryptolocker.exe 28 PID 1632 wrote to memory of 1680 1632 2024-02-25_c192ef7aec1823ef849b053102c2ee35_cryptolocker.exe 28 PID 1632 wrote to memory of 1680 1632 2024-02-25_c192ef7aec1823ef849b053102c2ee35_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-25_c192ef7aec1823ef849b053102c2ee35_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-25_c192ef7aec1823ef849b053102c2ee35_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\lossy.exe"C:\Users\Admin\AppData\Local\Temp\lossy.exe"2⤵
- Executes dropped EXE
PID:1680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD5757de12bce00816950a2c1847e17ce35
SHA1b1c6091f90aa9824cf44b1092e54b10b1afa1679
SHA256f04ced7373c44fed9b8fdeb7e41cc61fe0f60f3ca9cd1a271133420a4c375aba
SHA512b1daecd192e8257db96f6a2baf7d69496674a5ea7eba51dbd9c1bb3b17f4ddcfa089715dbfe78736ad80aaf743827d15d03b8604938de32ef9f657b13b9d1c87