Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
04-03-2024 03:17
Static task
static1
Behavioral task
behavioral1
Sample
a9c7211eb7e2a5bacb6256554ca760fc.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a9c7211eb7e2a5bacb6256554ca760fc.exe
Resource
win10v2004-20240226-en
General
-
Target
a9c7211eb7e2a5bacb6256554ca760fc.exe
-
Size
412KB
-
MD5
a9c7211eb7e2a5bacb6256554ca760fc
-
SHA1
a7c811659c1062b42a6d29cbed1cca8d38e6af6d
-
SHA256
3386dcb841b528ec70cb2c44ef5eaed7a12eaee4afcc69047f0770303bdb9fdb
-
SHA512
c19c5d87c67fd73f07ddb303ea3627b460cfd57d0ee36a1d9694cec0ace699bef0ab46d8faa5d935de2132deaa17a3f629db5f28d561ec8207f89eda1603c374
-
SSDEEP
6144:EWmw0EuCN0pLWgTO3x5N22vWvLRKKAX5l++SybIvCBt933bpyjzx4oQDxS2g:EWkEuCaNT85I2vCMX5l+ZRvUtZC
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Deletes itself 1 IoCs
pid Process 3424 {34184A33-0407-212E-3320-09040709E2C2}.exe -
Executes dropped EXE 2 IoCs
pid Process 3424 {34184A33-0407-212E-3320-09040709E2C2}.exe 2936 {34184A33-0407-212E-3320-09040709E2C2}.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Roaming\\{34184A33-0407-212E-3320-09040709E2C2}.exe" {34184A33-0407-212E-3320-09040709E2C2}.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3528 wrote to memory of 3424 3528 a9c7211eb7e2a5bacb6256554ca760fc.exe 88 PID 3528 wrote to memory of 3424 3528 a9c7211eb7e2a5bacb6256554ca760fc.exe 88 PID 3528 wrote to memory of 3424 3528 a9c7211eb7e2a5bacb6256554ca760fc.exe 88 PID 3424 wrote to memory of 2936 3424 {34184A33-0407-212E-3320-09040709E2C2}.exe 89 PID 3424 wrote to memory of 2936 3424 {34184A33-0407-212E-3320-09040709E2C2}.exe 89 PID 3424 wrote to memory of 2936 3424 {34184A33-0407-212E-3320-09040709E2C2}.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9c7211eb7e2a5bacb6256554ca760fc.exe"C:\Users\Admin\AppData\Local\Temp\a9c7211eb7e2a5bacb6256554ca760fc.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" "/rC:\Users\Admin\AppData\Local\Temp\a9c7211eb7e2a5bacb6256554ca760fc.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" /w000002203⤵
- Executes dropped EXE
PID:2936
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412KB
MD5a9c7211eb7e2a5bacb6256554ca760fc
SHA1a7c811659c1062b42a6d29cbed1cca8d38e6af6d
SHA2563386dcb841b528ec70cb2c44ef5eaed7a12eaee4afcc69047f0770303bdb9fdb
SHA512c19c5d87c67fd73f07ddb303ea3627b460cfd57d0ee36a1d9694cec0ace699bef0ab46d8faa5d935de2132deaa17a3f629db5f28d561ec8207f89eda1603c374