Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/03/2024, 01:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-06_6f6a53bbe62bfd90372a386deef3a0a7_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-06_6f6a53bbe62bfd90372a386deef3a0a7_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-06_6f6a53bbe62bfd90372a386deef3a0a7_cryptolocker.exe
-
Size
38KB
-
MD5
6f6a53bbe62bfd90372a386deef3a0a7
-
SHA1
7be253ef688571026aab70f3ba4f7a3a310895af
-
SHA256
e9535a6fc2d88256f3ca886694cffd1c52a87fa8382d8e55c364f97f94aa1e7e
-
SHA512
27fec1357ad08ed5274d242ec55e2683da460608e0558f35edcae8afd58276dfdea45f5859bb9f8d0bfa1256e8762f795d4843ced9172718c35b1601df22f1eb
-
SSDEEP
768:wHGGaSawqnwjRQ6ESlmFOsPoOdQtOOtEvwDpjm6WaJIOc+UPPEkLHwp:YGzl5wjRQBBOsP1QMOtEvwDpjgarrkLC
Malware Config
Signatures
-
Detection of CryptoLocker Variants 4 IoCs
resource yara_rule behavioral1/memory/2412-0-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000e000000012248-11.dat CryptoLocker_rule2 behavioral1/memory/2412-15-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2644-16-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 4 IoCs
resource yara_rule behavioral1/memory/2412-0-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_set1 behavioral1/files/0x000e000000012248-11.dat CryptoLocker_set1 behavioral1/memory/2412-15-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_set1 behavioral1/memory/2644-16-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2644 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2412 2024-03-06_6f6a53bbe62bfd90372a386deef3a0a7_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2644 2412 2024-03-06_6f6a53bbe62bfd90372a386deef3a0a7_cryptolocker.exe 28 PID 2412 wrote to memory of 2644 2412 2024-03-06_6f6a53bbe62bfd90372a386deef3a0a7_cryptolocker.exe 28 PID 2412 wrote to memory of 2644 2412 2024-03-06_6f6a53bbe62bfd90372a386deef3a0a7_cryptolocker.exe 28 PID 2412 wrote to memory of 2644 2412 2024-03-06_6f6a53bbe62bfd90372a386deef3a0a7_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-06_6f6a53bbe62bfd90372a386deef3a0a7_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-06_6f6a53bbe62bfd90372a386deef3a0a7_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD55c1786b5715121ecd703e62a057874d1
SHA108081d911d1ae73d998ac3dedfb04ef9e93251d2
SHA2569058ef8b98d549ba5572e8007767cf6850cb9f53231f5f90981017aad30db211
SHA5121b69239e44657f276125db9d993f29fbe167ba75825dc611bc172948d0dc1f5280d7271985648db08043e7dbc1fff453588b08dd77a09fc41a1c554b7683701a