Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/02/2024, 15:50
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-25_c40855b1903b58de8c4a7e8644380109_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-25_c40855b1903b58de8c4a7e8644380109_cryptolocker.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-25_c40855b1903b58de8c4a7e8644380109_cryptolocker.exe
-
Size
91KB
-
MD5
c40855b1903b58de8c4a7e8644380109
-
SHA1
befb8bdb79f73cbd5f764db91200b8090c05c00a
-
SHA256
abefa653ed9fda5295b2bc25a8562932ebf229706e6b6a454f19442fc07d2fa6
-
SHA512
7fb359b31416992a2efc1feab584f1744fa3ffc2b9e6bff51355b28d3ead1a3afbd4c8a03d21d7212a621bfe73ae36b5e1fe153c7a515b1f177afa862eaca85d
-
SSDEEP
1536:V6QFElP6n+gMQMOtEvwDpjQGYQbN/PKwMgwV:V6a+pOtEvwDpjtzk
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000900000001222c-13.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000900000001222c-13.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2300 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1136 2024-02-25_c40855b1903b58de8c4a7e8644380109_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1136 wrote to memory of 2300 1136 2024-02-25_c40855b1903b58de8c4a7e8644380109_cryptolocker.exe 28 PID 1136 wrote to memory of 2300 1136 2024-02-25_c40855b1903b58de8c4a7e8644380109_cryptolocker.exe 28 PID 1136 wrote to memory of 2300 1136 2024-02-25_c40855b1903b58de8c4a7e8644380109_cryptolocker.exe 28 PID 1136 wrote to memory of 2300 1136 2024-02-25_c40855b1903b58de8c4a7e8644380109_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-25_c40855b1903b58de8c4a7e8644380109_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-25_c40855b1903b58de8c4a7e8644380109_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2300
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD553bdf0b95947044396c8ea09ae27f3c5
SHA16fb772e6066b561b7f9ac5da779bf6b826faf8c2
SHA256c331a9d7fb128c98bcc885090c95625c9184a5190156d09f2ad2acda87f054a1
SHA512ffe73304d1a838ff6977acbdce01b1b5cbdfca9a927bd5714cf5a1f47c43a04dea910fcb3438b5638d62ebaa24954ce95f82f47f43b8bea8003d5e1df814c0ed