Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/03/2024, 22:46
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-10_58fbd8a0c3eb16d7b3011bab72b5aeb6_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-10_58fbd8a0c3eb16d7b3011bab72b5aeb6_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-10_58fbd8a0c3eb16d7b3011bab72b5aeb6_cryptolocker.exe
-
Size
51KB
-
MD5
58fbd8a0c3eb16d7b3011bab72b5aeb6
-
SHA1
db840083d3f3dfdc44bcaa8e82a6f8db62f380aa
-
SHA256
b7800bad893ef2424db29430e238c27d56c2071ec0abc027da457a77ab2bf076
-
SHA512
95a7521c8e4ef4a036a8e070ca80edff1aa61313b48e01c5df0f7daed7a7a6c6f9afa689f386d8bbfcc08cf3d5591b6f1ed32cfc0d6e1a00af44211f8fe34d0e
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/BtOOtEvwDpjBVaD3E09vxmlcafR:X6QFElP6n+gJBMOtEvwDpjBtExmlnR
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000b00000001223a-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000b00000001223a-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2196 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1876 2024-03-10_58fbd8a0c3eb16d7b3011bab72b5aeb6_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1876 wrote to memory of 2196 1876 2024-03-10_58fbd8a0c3eb16d7b3011bab72b5aeb6_cryptolocker.exe 28 PID 1876 wrote to memory of 2196 1876 2024-03-10_58fbd8a0c3eb16d7b3011bab72b5aeb6_cryptolocker.exe 28 PID 1876 wrote to memory of 2196 1876 2024-03-10_58fbd8a0c3eb16d7b3011bab72b5aeb6_cryptolocker.exe 28 PID 1876 wrote to memory of 2196 1876 2024-03-10_58fbd8a0c3eb16d7b3011bab72b5aeb6_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-10_58fbd8a0c3eb16d7b3011bab72b5aeb6_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-10_58fbd8a0c3eb16d7b3011bab72b5aeb6_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2196
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD5943c73b8538ad1d0b8d3e84b0761729f
SHA146e671337c1ee5fbb9a0d0226cb9d6eb22d54664
SHA2567c5c231cb2f8d3fe2e49364e73a3337e14e9672f531d96f12a243d3dc0af3058
SHA51236c11011f931b158b843c5fbe874c88a8eeaf5bfe308eb1b95458ff81445d9b69721f198a2c291be11aa108206a66f8670d87b575e74710dc12bea5e0f286824