Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
04-03-2024 03:15
Static task
static1
Behavioral task
behavioral1
Sample
a769c781e3748314825f3effbd176b9b.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
a769c781e3748314825f3effbd176b9b.exe
Resource
win10v2004-20240226-en
General
-
Target
a769c781e3748314825f3effbd176b9b.exe
-
Size
400KB
-
MD5
a769c781e3748314825f3effbd176b9b
-
SHA1
23b605d66164573492da31bcdffccc01fd9d3957
-
SHA256
7160b2b41f1b7d0b6546663586ad8207c13a5e240d23cbedbfc9ba81ac406d1a
-
SHA512
8456c3718f529d17e182b865e8c8fb2c00f43abfaa4eabd024bafa6874ddc90a4eb624229ddbad5e9f0e244ff0de107fbef116038cb72fff13f703b46145c536
-
SSDEEP
6144:VWmw0EuCN0pLWgTO3x5N22vWvLRKKAX5l++SybIvCvgCSng:VWkEuCaNT85I2vCMX5l+ZRv9CD
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Deletes itself 1 IoCs
pid Process 2260 {34184A33-0407-212E-3320-09040709E2C2}.exe -
Executes dropped EXE 2 IoCs
pid Process 2260 {34184A33-0407-212E-3320-09040709E2C2}.exe 3048 {34184A33-0407-212E-3320-09040709E2C2}.exe -
Loads dropped DLL 2 IoCs
pid Process 1756 a769c781e3748314825f3effbd176b9b.exe 2260 {34184A33-0407-212E-3320-09040709E2C2}.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Roaming\\{34184A33-0407-212E-3320-09040709E2C2}.exe" {34184A33-0407-212E-3320-09040709E2C2}.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1756 wrote to memory of 2260 1756 a769c781e3748314825f3effbd176b9b.exe 28 PID 1756 wrote to memory of 2260 1756 a769c781e3748314825f3effbd176b9b.exe 28 PID 1756 wrote to memory of 2260 1756 a769c781e3748314825f3effbd176b9b.exe 28 PID 1756 wrote to memory of 2260 1756 a769c781e3748314825f3effbd176b9b.exe 28 PID 2260 wrote to memory of 3048 2260 {34184A33-0407-212E-3320-09040709E2C2}.exe 29 PID 2260 wrote to memory of 3048 2260 {34184A33-0407-212E-3320-09040709E2C2}.exe 29 PID 2260 wrote to memory of 3048 2260 {34184A33-0407-212E-3320-09040709E2C2}.exe 29 PID 2260 wrote to memory of 3048 2260 {34184A33-0407-212E-3320-09040709E2C2}.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\a769c781e3748314825f3effbd176b9b.exe"C:\Users\Admin\AppData\Local\Temp\a769c781e3748314825f3effbd176b9b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" "/rC:\Users\Admin\AppData\Local\Temp\a769c781e3748314825f3effbd176b9b.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" /w000000C83⤵
- Executes dropped EXE
PID:3048
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
400KB
MD5a769c781e3748314825f3effbd176b9b
SHA123b605d66164573492da31bcdffccc01fd9d3957
SHA2567160b2b41f1b7d0b6546663586ad8207c13a5e240d23cbedbfc9ba81ac406d1a
SHA5128456c3718f529d17e182b865e8c8fb2c00f43abfaa4eabd024bafa6874ddc90a4eb624229ddbad5e9f0e244ff0de107fbef116038cb72fff13f703b46145c536