Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
06/03/2024, 04:04
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-06_fbd09989b625d988c873a8c598debf33_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-03-06_fbd09989b625d988c873a8c598debf33_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-06_fbd09989b625d988c873a8c598debf33_cryptolocker.exe
-
Size
38KB
-
MD5
fbd09989b625d988c873a8c598debf33
-
SHA1
ce16c202bef301133beb0b0582ba8534d4fd6e49
-
SHA256
6d2f4aaa61150976ed272f964538685b586124795164c97bae7eec12f7e11248
-
SHA512
157433cf03c2ebf7652f402d3e6622f34a0e78cadc5d9eaa6d28158d19edb7001cffe550327c0afd9009b8e36943cdb5433e264fbc681cd1cf0a08540a616d4c
-
SSDEEP
768:bIDOw9UiaCHfjnE0Sf88AvvP1oghYvm9/6Dy8wJv:bIDOw9a0Dwo3P1ojvUSDhwB
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x0008000000012252-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2256 lossy.exe -
Loads dropped DLL 1 IoCs
pid Process 2760 2024-03-06_fbd09989b625d988c873a8c598debf33_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2760 wrote to memory of 2256 2760 2024-03-06_fbd09989b625d988c873a8c598debf33_cryptolocker.exe 28 PID 2760 wrote to memory of 2256 2760 2024-03-06_fbd09989b625d988c873a8c598debf33_cryptolocker.exe 28 PID 2760 wrote to memory of 2256 2760 2024-03-06_fbd09989b625d988c873a8c598debf33_cryptolocker.exe 28 PID 2760 wrote to memory of 2256 2760 2024-03-06_fbd09989b625d988c873a8c598debf33_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-06_fbd09989b625d988c873a8c598debf33_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-06_fbd09989b625d988c873a8c598debf33_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\lossy.exe"C:\Users\Admin\AppData\Local\Temp\lossy.exe"2⤵
- Executes dropped EXE
PID:2256
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD5cb2274d612b0fc98ac23f286f3c7a40c
SHA1cd3ce625844b6e1e4a3d03ff76602fa24875665d
SHA256ade40a347a60f104ece658f0b976b8bc26e8b032464828a35d1149ff64bb0c07
SHA51209ffc49769fe7fefcaaf1196e2bc5b8f04e1316c03f4b8e5d2db7edfb6d1a46a80130cb9937c189351855f9b48911ce5d8a82f6c13a0d61ca8376224b5743b76