Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
02-03-2024 17:33
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-02_e58185dfcfc4f42ce7380c34c0642129_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-02_e58185dfcfc4f42ce7380c34c0642129_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-02_e58185dfcfc4f42ce7380c34c0642129_cryptolocker.exe
-
Size
361KB
-
MD5
e58185dfcfc4f42ce7380c34c0642129
-
SHA1
9c4420482a202b77d1c984618e3ddb0ef697ac2b
-
SHA256
525d562263b48390c5cafba03864679b116fb706a167ce4a58e5d60a5f8578ef
-
SHA512
3981f1546f255a4f56388907864705e324ca0098f2527f3986a254097ef7595fe387a9ccb3d243c122128d0ca72dd02fb02fd3a8b2b17614c341ab5ad49e713c
-
SSDEEP
6144:UWmw0EuCN0pLWgTO3x5N22vWvLRKKAX5l++SybIvCDniPf:UWkEuCaNT85I2vCMX5l+ZRvaiH
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Deletes itself 1 IoCs
Processes:
{34184A33-0407-212E-3320-09040709E2C2}.exepid process 4580 {34184A33-0407-212E-3320-09040709E2C2}.exe -
Executes dropped EXE 2 IoCs
Processes:
{34184A33-0407-212E-3320-09040709E2C2}.exe{34184A33-0407-212E-3320-09040709E2C2}.exepid process 4580 {34184A33-0407-212E-3320-09040709E2C2}.exe 2728 {34184A33-0407-212E-3320-09040709E2C2}.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
{34184A33-0407-212E-3320-09040709E2C2}.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Roaming\\{34184A33-0407-212E-3320-09040709E2C2}.exe" {34184A33-0407-212E-3320-09040709E2C2}.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
2024-03-02_e58185dfcfc4f42ce7380c34c0642129_cryptolocker.exe{34184A33-0407-212E-3320-09040709E2C2}.exedescription pid process target process PID 312 wrote to memory of 4580 312 2024-03-02_e58185dfcfc4f42ce7380c34c0642129_cryptolocker.exe {34184A33-0407-212E-3320-09040709E2C2}.exe PID 312 wrote to memory of 4580 312 2024-03-02_e58185dfcfc4f42ce7380c34c0642129_cryptolocker.exe {34184A33-0407-212E-3320-09040709E2C2}.exe PID 312 wrote to memory of 4580 312 2024-03-02_e58185dfcfc4f42ce7380c34c0642129_cryptolocker.exe {34184A33-0407-212E-3320-09040709E2C2}.exe PID 4580 wrote to memory of 2728 4580 {34184A33-0407-212E-3320-09040709E2C2}.exe {34184A33-0407-212E-3320-09040709E2C2}.exe PID 4580 wrote to memory of 2728 4580 {34184A33-0407-212E-3320-09040709E2C2}.exe {34184A33-0407-212E-3320-09040709E2C2}.exe PID 4580 wrote to memory of 2728 4580 {34184A33-0407-212E-3320-09040709E2C2}.exe {34184A33-0407-212E-3320-09040709E2C2}.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-02_e58185dfcfc4f42ce7380c34c0642129_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-02_e58185dfcfc4f42ce7380c34c0642129_cryptolocker.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:312 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" "/rC:\Users\Admin\AppData\Local\Temp\2024-03-02_e58185dfcfc4f42ce7380c34c0642129_cryptolocker.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" /w0000021C3⤵
- Executes dropped EXE
PID:2728
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
361KB
MD5e58185dfcfc4f42ce7380c34c0642129
SHA19c4420482a202b77d1c984618e3ddb0ef697ac2b
SHA256525d562263b48390c5cafba03864679b116fb706a167ce4a58e5d60a5f8578ef
SHA5123981f1546f255a4f56388907864705e324ca0098f2527f3986a254097ef7595fe387a9ccb3d243c122128d0ca72dd02fb02fd3a8b2b17614c341ab5ad49e713c