Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
08/03/2024, 05:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-08_42f6e8941ac9515bb216944966b56723_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-03-08_42f6e8941ac9515bb216944966b56723_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-08_42f6e8941ac9515bb216944966b56723_cryptolocker.exe
-
Size
95KB
-
MD5
42f6e8941ac9515bb216944966b56723
-
SHA1
691637c294f472affcae15f9a9b037b5db509ab5
-
SHA256
f7d4fb78ed65eb48f52200c873231d32fea42e8b1b1b8c3aefb87ecb170ad1e6
-
SHA512
ca9d2ee22a0f79e2451af4c4e95216b0936908768264d8d142aaa101d7b9d1461342fd47e63c3ca32030f829672ccea36ea283bce73430fc80442ac35179a55d
-
SSDEEP
1536:Z6QFElP6n+gMQMOtEvwDpjQGYQbN/PKwNC4wxy:Z6a+pOtEvwDpjtzB
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x0009000000015f01-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x0009000000015f01-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2176 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1328 2024-03-08_42f6e8941ac9515bb216944966b56723_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1328 wrote to memory of 2176 1328 2024-03-08_42f6e8941ac9515bb216944966b56723_cryptolocker.exe 28 PID 1328 wrote to memory of 2176 1328 2024-03-08_42f6e8941ac9515bb216944966b56723_cryptolocker.exe 28 PID 1328 wrote to memory of 2176 1328 2024-03-08_42f6e8941ac9515bb216944966b56723_cryptolocker.exe 28 PID 1328 wrote to memory of 2176 1328 2024-03-08_42f6e8941ac9515bb216944966b56723_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-08_42f6e8941ac9515bb216944966b56723_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-08_42f6e8941ac9515bb216944966b56723_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD5cc76a0ab19ed0e51e777911eda3ce75f
SHA147b74161a922610c016da353e91d9ede48baa5b7
SHA256dc2785d46dcf81733a86065bf770bdc42f16bff1fbca861bcafea9e1b4c9952f
SHA5125a037ad7805aa7a3d888d5425de8f01f5ed4e5e21f795d632945222ce4db6b1e647d5e9de008a0315641f48213631c1222b37d71610793dcef94e1da30440cba