Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/02/2024, 11:45
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-28_3e16f1290cd6d1c2b1de215c0151856c_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-28_3e16f1290cd6d1c2b1de215c0151856c_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-02-28_3e16f1290cd6d1c2b1de215c0151856c_cryptolocker.exe
-
Size
38KB
-
MD5
3e16f1290cd6d1c2b1de215c0151856c
-
SHA1
988bb7492084f68c07ffc399bf10ccfbac6ef82f
-
SHA256
fe520111b6912f01b6896c8bb89c3dd40524eb8036b2e461055bb3dee5133293
-
SHA512
80b5fda64458b5392f80ffbcef65460e8f32edfd4e6ab676269c2d856be03ba6e83746d2f7136876f55873deb31470da707583451ef5ab844e58737a3c823c72
-
SSDEEP
768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpj/MLam5axo:V6QFElP6n+gMQMOtEvwDpjyaYaa
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x0009000000012256-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x0009000000012256-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 1796 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2512 2024-02-28_3e16f1290cd6d1c2b1de215c0151856c_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2512 wrote to memory of 1796 2512 2024-02-28_3e16f1290cd6d1c2b1de215c0151856c_cryptolocker.exe 28 PID 2512 wrote to memory of 1796 2512 2024-02-28_3e16f1290cd6d1c2b1de215c0151856c_cryptolocker.exe 28 PID 2512 wrote to memory of 1796 2512 2024-02-28_3e16f1290cd6d1c2b1de215c0151856c_cryptolocker.exe 28 PID 2512 wrote to memory of 1796 2512 2024-02-28_3e16f1290cd6d1c2b1de215c0151856c_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-28_3e16f1290cd6d1c2b1de215c0151856c_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-28_3e16f1290cd6d1c2b1de215c0151856c_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:1796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD5c926f3083dd2327a7d71f2dab980dd69
SHA1b57ca20ebd8da9cf4e03c020d41277e7cac36eef
SHA25696ee0d7ca08de3bf81baf3fdb45f91a614fc5605b715926053951271e03c9257
SHA5122d7f973e5b67892e4fc617491969e0592ca699185fcda35fb50bd350d9dc0bca1302bb3777b3951130ca751ede49a24825e681a422dd06030dd72bed35197f8f