Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-03-2024 01:46
Static task
static1
Behavioral task
behavioral1
Sample
3843b3578a814cf378bb000394095425.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3843b3578a814cf378bb000394095425.exe
Resource
win10v2004-20240226-en
General
-
Target
3843b3578a814cf378bb000394095425.exe
-
Size
390KB
-
MD5
3843b3578a814cf378bb000394095425
-
SHA1
6d43a52d954c7c48b5ac7c81dcdae271c65ba766
-
SHA256
9ab9779a9def35098b51524c517bd75fc302904fc248a1c02498bdd7e11fa99f
-
SHA512
388d2d8642802cec6ffe78ff1d6e9f75db458a9df7a7f7d46e8bb433df55143bb27e0417a1d043a21994c2ef183431ea660577dada7d54f5a73c0e3d29712eaf
-
SSDEEP
6144:aWmw0EuCN0pLWgTO3x5N22vWvLRKKAX5l++SybIvCJDBSig:aWkEuCaNT85I2vCMX5l+ZRve+
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Deletes itself 1 IoCs
pid Process 2312 {34184A33-0407-212E-3320-09040709E2C2}.exe -
Executes dropped EXE 2 IoCs
pid Process 2312 {34184A33-0407-212E-3320-09040709E2C2}.exe 2748 {34184A33-0407-212E-3320-09040709E2C2}.exe -
Loads dropped DLL 2 IoCs
pid Process 2016 3843b3578a814cf378bb000394095425.exe 2312 {34184A33-0407-212E-3320-09040709E2C2}.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Roaming\\{34184A33-0407-212E-3320-09040709E2C2}.exe" {34184A33-0407-212E-3320-09040709E2C2}.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2016 wrote to memory of 2312 2016 3843b3578a814cf378bb000394095425.exe 28 PID 2016 wrote to memory of 2312 2016 3843b3578a814cf378bb000394095425.exe 28 PID 2016 wrote to memory of 2312 2016 3843b3578a814cf378bb000394095425.exe 28 PID 2016 wrote to memory of 2312 2016 3843b3578a814cf378bb000394095425.exe 28 PID 2312 wrote to memory of 2748 2312 {34184A33-0407-212E-3320-09040709E2C2}.exe 29 PID 2312 wrote to memory of 2748 2312 {34184A33-0407-212E-3320-09040709E2C2}.exe 29 PID 2312 wrote to memory of 2748 2312 {34184A33-0407-212E-3320-09040709E2C2}.exe 29 PID 2312 wrote to memory of 2748 2312 {34184A33-0407-212E-3320-09040709E2C2}.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3843b3578a814cf378bb000394095425.exe"C:\Users\Admin\AppData\Local\Temp\3843b3578a814cf378bb000394095425.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" "/rC:\Users\Admin\AppData\Local\Temp\3843b3578a814cf378bb000394095425.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" /w000000C83⤵
- Executes dropped EXE
PID:2748
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
390KB
MD53843b3578a814cf378bb000394095425
SHA16d43a52d954c7c48b5ac7c81dcdae271c65ba766
SHA2569ab9779a9def35098b51524c517bd75fc302904fc248a1c02498bdd7e11fa99f
SHA512388d2d8642802cec6ffe78ff1d6e9f75db458a9df7a7f7d46e8bb433df55143bb27e0417a1d043a21994c2ef183431ea660577dada7d54f5a73c0e3d29712eaf