Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
04-03-2024 01:45
Static task
static1
Behavioral task
behavioral1
Sample
36d2bd43c8cea74a7e899f57c9baab64.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
36d2bd43c8cea74a7e899f57c9baab64.exe
Resource
win10v2004-20240226-en
General
-
Target
36d2bd43c8cea74a7e899f57c9baab64.exe
-
Size
395KB
-
MD5
36d2bd43c8cea74a7e899f57c9baab64
-
SHA1
84bc63932258fb3a58c39465b365cecf920547ec
-
SHA256
163db290ba2f8a088ea7bb5838bb3747cd49ed89848dc378f190b9fc8f0fe7c8
-
SHA512
84f7fac2724b5e858a0a874b1eea802ea74feb08eb1c344e13c6fb0863d572b126a54d0ac7b83e66a24367dce260da0c00e951980f537f7fadde09b3d6a159ee
-
SSDEEP
6144:eWmw0EuCN0pLWgTO3x5N22vWvLRKKAX5l++SybIvCc//IQ3sd:eWkEuCaNT85I2vCMX5l+ZRvJ/wQ3sd
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Deletes itself 1 IoCs
pid Process 1696 {34184A33-0407-212E-3320-09040709E2C2}.exe -
Executes dropped EXE 2 IoCs
pid Process 1696 {34184A33-0407-212E-3320-09040709E2C2}.exe 1204 {34184A33-0407-212E-3320-09040709E2C2}.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Roaming\\{34184A33-0407-212E-3320-09040709E2C2}.exe" {34184A33-0407-212E-3320-09040709E2C2}.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2200 wrote to memory of 1696 2200 36d2bd43c8cea74a7e899f57c9baab64.exe 89 PID 2200 wrote to memory of 1696 2200 36d2bd43c8cea74a7e899f57c9baab64.exe 89 PID 2200 wrote to memory of 1696 2200 36d2bd43c8cea74a7e899f57c9baab64.exe 89 PID 1696 wrote to memory of 1204 1696 {34184A33-0407-212E-3320-09040709E2C2}.exe 90 PID 1696 wrote to memory of 1204 1696 {34184A33-0407-212E-3320-09040709E2C2}.exe 90 PID 1696 wrote to memory of 1204 1696 {34184A33-0407-212E-3320-09040709E2C2}.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\36d2bd43c8cea74a7e899f57c9baab64.exe"C:\Users\Admin\AppData\Local\Temp\36d2bd43c8cea74a7e899f57c9baab64.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" "/rC:\Users\Admin\AppData\Local\Temp\36d2bd43c8cea74a7e899f57c9baab64.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" /w000002243⤵
- Executes dropped EXE
PID:1204
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395KB
MD536d2bd43c8cea74a7e899f57c9baab64
SHA184bc63932258fb3a58c39465b365cecf920547ec
SHA256163db290ba2f8a088ea7bb5838bb3747cd49ed89848dc378f190b9fc8f0fe7c8
SHA51284f7fac2724b5e858a0a874b1eea802ea74feb08eb1c344e13c6fb0863d572b126a54d0ac7b83e66a24367dce260da0c00e951980f537f7fadde09b3d6a159ee