Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-03-2024 03:02
Static task
static1
Behavioral task
behavioral1
Sample
a060be447351d0e1fdb71f45e8cc3619.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a060be447351d0e1fdb71f45e8cc3619.exe
Resource
win10v2004-20240226-en
General
-
Target
a060be447351d0e1fdb71f45e8cc3619.exe
-
Size
415KB
-
MD5
a060be447351d0e1fdb71f45e8cc3619
-
SHA1
45179b3f489d99bee2d33def800f7d6978ba9bc3
-
SHA256
e3fa90f7c598daab4c168eabb4dbc9f95ee89b28b857e27c9f1f30ab3b38e915
-
SHA512
5fbacdc82196e088a27165be1243fbc78fe797721bce458e654ad96a8c9e00f59154844f15f402ea8fe99b141ff922272c5a8979404864edbed49e7cdf81f4e6
-
SSDEEP
6144:iWmw0EuCN0pLWgTO3x5N22vWvLRKKAX5l++SybIvCOivgUOCo7nuao4S0b28BW7z:iWkEuCaNT85I2vCMX5l+ZRv/S
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Deletes itself 1 IoCs
pid Process 2892 {34184A33-0407-212E-3320-09040709E2C2}.exe -
Executes dropped EXE 2 IoCs
pid Process 2892 {34184A33-0407-212E-3320-09040709E2C2}.exe 2368 {34184A33-0407-212E-3320-09040709E2C2}.exe -
Loads dropped DLL 2 IoCs
pid Process 2384 a060be447351d0e1fdb71f45e8cc3619.exe 2892 {34184A33-0407-212E-3320-09040709E2C2}.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Roaming\\{34184A33-0407-212E-3320-09040709E2C2}.exe" {34184A33-0407-212E-3320-09040709E2C2}.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2892 2384 a060be447351d0e1fdb71f45e8cc3619.exe 28 PID 2384 wrote to memory of 2892 2384 a060be447351d0e1fdb71f45e8cc3619.exe 28 PID 2384 wrote to memory of 2892 2384 a060be447351d0e1fdb71f45e8cc3619.exe 28 PID 2384 wrote to memory of 2892 2384 a060be447351d0e1fdb71f45e8cc3619.exe 28 PID 2892 wrote to memory of 2368 2892 {34184A33-0407-212E-3320-09040709E2C2}.exe 29 PID 2892 wrote to memory of 2368 2892 {34184A33-0407-212E-3320-09040709E2C2}.exe 29 PID 2892 wrote to memory of 2368 2892 {34184A33-0407-212E-3320-09040709E2C2}.exe 29 PID 2892 wrote to memory of 2368 2892 {34184A33-0407-212E-3320-09040709E2C2}.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\a060be447351d0e1fdb71f45e8cc3619.exe"C:\Users\Admin\AppData\Local\Temp\a060be447351d0e1fdb71f45e8cc3619.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" "/rC:\Users\Admin\AppData\Local\Temp\a060be447351d0e1fdb71f45e8cc3619.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" /w000000C83⤵
- Executes dropped EXE
PID:2368
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
415KB
MD5a060be447351d0e1fdb71f45e8cc3619
SHA145179b3f489d99bee2d33def800f7d6978ba9bc3
SHA256e3fa90f7c598daab4c168eabb4dbc9f95ee89b28b857e27c9f1f30ab3b38e915
SHA5125fbacdc82196e088a27165be1243fbc78fe797721bce458e654ad96a8c9e00f59154844f15f402ea8fe99b141ff922272c5a8979404864edbed49e7cdf81f4e6