Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-03-2024 03:17
Static task
static1
Behavioral task
behavioral1
Sample
a9c7211eb7e2a5bacb6256554ca760fc.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a9c7211eb7e2a5bacb6256554ca760fc.exe
Resource
win10v2004-20240226-en
General
-
Target
a9c7211eb7e2a5bacb6256554ca760fc.exe
-
Size
412KB
-
MD5
a9c7211eb7e2a5bacb6256554ca760fc
-
SHA1
a7c811659c1062b42a6d29cbed1cca8d38e6af6d
-
SHA256
3386dcb841b528ec70cb2c44ef5eaed7a12eaee4afcc69047f0770303bdb9fdb
-
SHA512
c19c5d87c67fd73f07ddb303ea3627b460cfd57d0ee36a1d9694cec0ace699bef0ab46d8faa5d935de2132deaa17a3f629db5f28d561ec8207f89eda1603c374
-
SSDEEP
6144:EWmw0EuCN0pLWgTO3x5N22vWvLRKKAX5l++SybIvCBt933bpyjzx4oQDxS2g:EWkEuCaNT85I2vCMX5l+ZRvUtZC
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Deletes itself 1 IoCs
pid Process 2032 {34184A33-0407-212E-3320-09040709E2C2}.exe -
Executes dropped EXE 2 IoCs
pid Process 2032 {34184A33-0407-212E-3320-09040709E2C2}.exe 2620 {34184A33-0407-212E-3320-09040709E2C2}.exe -
Loads dropped DLL 2 IoCs
pid Process 2372 a9c7211eb7e2a5bacb6256554ca760fc.exe 2032 {34184A33-0407-212E-3320-09040709E2C2}.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Roaming\\{34184A33-0407-212E-3320-09040709E2C2}.exe" {34184A33-0407-212E-3320-09040709E2C2}.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2032 2372 a9c7211eb7e2a5bacb6256554ca760fc.exe 28 PID 2372 wrote to memory of 2032 2372 a9c7211eb7e2a5bacb6256554ca760fc.exe 28 PID 2372 wrote to memory of 2032 2372 a9c7211eb7e2a5bacb6256554ca760fc.exe 28 PID 2372 wrote to memory of 2032 2372 a9c7211eb7e2a5bacb6256554ca760fc.exe 28 PID 2032 wrote to memory of 2620 2032 {34184A33-0407-212E-3320-09040709E2C2}.exe 29 PID 2032 wrote to memory of 2620 2032 {34184A33-0407-212E-3320-09040709E2C2}.exe 29 PID 2032 wrote to memory of 2620 2032 {34184A33-0407-212E-3320-09040709E2C2}.exe 29 PID 2032 wrote to memory of 2620 2032 {34184A33-0407-212E-3320-09040709E2C2}.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9c7211eb7e2a5bacb6256554ca760fc.exe"C:\Users\Admin\AppData\Local\Temp\a9c7211eb7e2a5bacb6256554ca760fc.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" "/rC:\Users\Admin\AppData\Local\Temp\a9c7211eb7e2a5bacb6256554ca760fc.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" /w000000C83⤵
- Executes dropped EXE
PID:2620
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412KB
MD5a9c7211eb7e2a5bacb6256554ca760fc
SHA1a7c811659c1062b42a6d29cbed1cca8d38e6af6d
SHA2563386dcb841b528ec70cb2c44ef5eaed7a12eaee4afcc69047f0770303bdb9fdb
SHA512c19c5d87c67fd73f07ddb303ea3627b460cfd57d0ee36a1d9694cec0ace699bef0ab46d8faa5d935de2132deaa17a3f629db5f28d561ec8207f89eda1603c374