Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
09/03/2024, 00:27
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-09_1bb70577c0aed30211beaf3cc5a281f0_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-03-09_1bb70577c0aed30211beaf3cc5a281f0_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-09_1bb70577c0aed30211beaf3cc5a281f0_cryptolocker.exe
-
Size
63KB
-
MD5
1bb70577c0aed30211beaf3cc5a281f0
-
SHA1
4f735264be4cb1b27cde11977f73b9df6d0a507a
-
SHA256
550fc871e32fa7e53e7ce0756a8361556c957b67b683b528f4af1f24a4735527
-
SHA512
9fe4f67770ed5253d88cabcc054eb2c205a77181512a0f5f60962375da5fb59ba6beba639736062add220b3796b083d069c2db9db273f25b493a1e39a8e168b3
-
SSDEEP
1536:V6QFElP6n+gMQMOtEvwDpjyaLccVCbmh85cU:V6a+pOtEvwDpjvY
Malware Config
Signatures
-
Detection of CryptoLocker Variants 2 IoCs
resource yara_rule behavioral1/files/0x000b0000000126ab-13.dat CryptoLocker_rule2 behavioral1/files/0x000b0000000126ab-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 2 IoCs
resource yara_rule behavioral1/files/0x000b0000000126ab-13.dat CryptoLocker_set1 behavioral1/files/0x000b0000000126ab-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2820 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2188 2024-03-09_1bb70577c0aed30211beaf3cc5a281f0_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2820 2188 2024-03-09_1bb70577c0aed30211beaf3cc5a281f0_cryptolocker.exe 28 PID 2188 wrote to memory of 2820 2188 2024-03-09_1bb70577c0aed30211beaf3cc5a281f0_cryptolocker.exe 28 PID 2188 wrote to memory of 2820 2188 2024-03-09_1bb70577c0aed30211beaf3cc5a281f0_cryptolocker.exe 28 PID 2188 wrote to memory of 2820 2188 2024-03-09_1bb70577c0aed30211beaf3cc5a281f0_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-09_1bb70577c0aed30211beaf3cc5a281f0_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-09_1bb70577c0aed30211beaf3cc5a281f0_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD5dd41de3a6d2b8dbfc464bbd363f8c74d
SHA16ba7e439c0d69642cac496facd8ec58690d5e90f
SHA256f6a04e762a5871267525be696761715be4da6d163c7642fd379449eb44d91749
SHA512781dd481edf1cc98f9d036157b6a4c085bc3be6a6e1704617e484882a2d7c0e17578709e73f67e754a01bac48f8239ae63f5d3f1eaa345c5acd1cecde734e3c7
-
Filesize
31KB
MD502f12a74323ceb1cc85fb41f942633e5
SHA11045f568ee0cdaa70955ec9ce6ffd64d247d2859
SHA25653d792bffeed4aad21197d15d4f2b673b99dc9f62d9bd0170dc37bd34b9dfbc1
SHA512baa83079f1ef7874c14ab324e3486ee8f832d36911af977c5b2e330cd8bd59aa933a83b1a437076f2a999870ff6ab6bafd29027eada176d33a0cc6c1e1fcb61f