Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29-02-2024 04:34
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-29_202bfa72d33be21e18e2ef6d58937417_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-29_202bfa72d33be21e18e2ef6d58937417_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-02-29_202bfa72d33be21e18e2ef6d58937417_cryptolocker.exe
-
Size
122KB
-
MD5
202bfa72d33be21e18e2ef6d58937417
-
SHA1
08d0ff975a1f027776166980ab6db5666a4fbe3d
-
SHA256
b81d8db5114392bec3c704ea74a7ab7000b5e26199c7f9651a6768980bc17e5b
-
SHA512
4c3870a0e302dea683f0a96e6719d34248f7072248b5f740e19f4ee6666142b8a4105077cbc13c0ee0351b6034a84a3e0ac9998efda7d18ef46451d4148caea7
-
SSDEEP
1536:u6QFElP6n+gWMOtEvwDpjJGYQbN/PKwMgJ:u6a++OtEvwDpj6z9
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000c000000012262-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000c000000012262-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2872 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2240 2024-02-29_202bfa72d33be21e18e2ef6d58937417_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2872 2240 2024-02-29_202bfa72d33be21e18e2ef6d58937417_cryptolocker.exe 28 PID 2240 wrote to memory of 2872 2240 2024-02-29_202bfa72d33be21e18e2ef6d58937417_cryptolocker.exe 28 PID 2240 wrote to memory of 2872 2240 2024-02-29_202bfa72d33be21e18e2ef6d58937417_cryptolocker.exe 28 PID 2240 wrote to memory of 2872 2240 2024-02-29_202bfa72d33be21e18e2ef6d58937417_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-29_202bfa72d33be21e18e2ef6d58937417_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-29_202bfa72d33be21e18e2ef6d58937417_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
122KB
MD505dc07f7a433933a0760ae57ece24205
SHA149fc1f8469725d67399bc04c285f6a38f86dcf82
SHA2568f15633990f09c13deb14d96bebc2b17f4c117a19a22c0bb35a1f5c4bf6e6e20
SHA5125d109c5319d12a29b0f0f65be562bafa39a005da424a662cd08f5a9238989b942359f720c1dc6b9e72f44d8b785f2923d36362b9049fe74e8ebf0d3b9bf97158