Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
28/02/2024, 16:12
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-28_fb1439dcc749a2a9c887bb29c2caed56_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-02-28_fb1439dcc749a2a9c887bb29c2caed56_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-02-28_fb1439dcc749a2a9c887bb29c2caed56_cryptolocker.exe
-
Size
69KB
-
MD5
fb1439dcc749a2a9c887bb29c2caed56
-
SHA1
b71169311aa53f37781a79a7ec49b63e4e49c267
-
SHA256
7ea02f3ed324d180c1f50bf5d0e65805b6f7d7b1d086ab1476c00caf4e24bf68
-
SHA512
d15d5684b6afdb563da584ef81a2fe24bd64f3302e81561c96804e4018e680a2569a40183485c9f788ed402e16f845822858dc53985807505b8d2a4f01eaec34
-
SSDEEP
1536:Dk/xY0sllyGQMOtEvwDpjwycDtKkQZQRKb61vSbgZ3QzNKUsn:DW60sllyWOtEvwDpjwF85W
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral1/memory/2484-0-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x00090000000122be-11.dat CryptoLocker_rule2 behavioral1/memory/2484-15-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_rule2 behavioral1/memory/3024-17-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2484-13-0x0000000002240000-0x000000000224B000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 5 IoCs
resource yara_rule behavioral1/memory/2484-0-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_set1 behavioral1/files/0x00090000000122be-11.dat CryptoLocker_set1 behavioral1/memory/2484-15-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_set1 behavioral1/memory/3024-17-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_set1 behavioral1/memory/2484-13-0x0000000002240000-0x000000000224B000-memory.dmp CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 3024 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2484 2024-02-28_fb1439dcc749a2a9c887bb29c2caed56_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2484 wrote to memory of 3024 2484 2024-02-28_fb1439dcc749a2a9c887bb29c2caed56_cryptolocker.exe 28 PID 2484 wrote to memory of 3024 2484 2024-02-28_fb1439dcc749a2a9c887bb29c2caed56_cryptolocker.exe 28 PID 2484 wrote to memory of 3024 2484 2024-02-28_fb1439dcc749a2a9c887bb29c2caed56_cryptolocker.exe 28 PID 2484 wrote to memory of 3024 2484 2024-02-28_fb1439dcc749a2a9c887bb29c2caed56_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-28_fb1439dcc749a2a9c887bb29c2caed56_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-28_fb1439dcc749a2a9c887bb29c2caed56_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD5b012df3bb9a28d78c51306d6946658f9
SHA139af9557b1bac312f5865a09c8c5c38fb817cf34
SHA256d9be5355e423ca48913e1a29c515e136bf23e39017f2299b4d0fc61b18608df4
SHA512c0e52e991badeab74a2f5d0071de0d7716a497d749d010822eb9a1172aacc2b46e7422511e802a661fd55be4d1d826f55230c185e874992e5f86c566ae427f80