Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
10/03/2024, 01:28
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-10_840e84ff15009c2a4ca8787751caa018_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-03-10_840e84ff15009c2a4ca8787751caa018_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-10_840e84ff15009c2a4ca8787751caa018_cryptolocker.exe
-
Size
31KB
-
MD5
840e84ff15009c2a4ca8787751caa018
-
SHA1
05ccb3829a477d5dc117a902eb62fef49596d9f9
-
SHA256
5a0ca7744541fbd164cf0535e42e7e82814cd083519a8cd255a386aa373c0ab8
-
SHA512
dccb181a07b183f00e11fdfff636c8fd9bf875440b9c3aa35c6b0e5540c63c29b8a90b0152f14c45ebd9ac5857970f407bee5465c03af2d98e3238be989ad2a0
-
SSDEEP
384:bmM0V/YPvnr801TRoUGPh4TKt6ATt1DqgPa3s/zzoCt9Zri:b7o/2n1TCraU6GD1a4Xt9Zri
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000b000000012251-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2896 rewok.exe -
Loads dropped DLL 1 IoCs
pid Process 2064 2024-03-10_840e84ff15009c2a4ca8787751caa018_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2064 2024-03-10_840e84ff15009c2a4ca8787751caa018_cryptolocker.exe 2896 rewok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2896 2064 2024-03-10_840e84ff15009c2a4ca8787751caa018_cryptolocker.exe 28 PID 2064 wrote to memory of 2896 2064 2024-03-10_840e84ff15009c2a4ca8787751caa018_cryptolocker.exe 28 PID 2064 wrote to memory of 2896 2064 2024-03-10_840e84ff15009c2a4ca8787751caa018_cryptolocker.exe 28 PID 2064 wrote to memory of 2896 2064 2024-03-10_840e84ff15009c2a4ca8787751caa018_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-10_840e84ff15009c2a4ca8787751caa018_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-10_840e84ff15009c2a4ca8787751caa018_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\rewok.exe"C:\Users\Admin\AppData\Local\Temp\rewok.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD583b6c6798ec8e7048911a99d48c9ca8d
SHA1a31d9d78d9365bf9773f4ef4de616091e6c521e5
SHA2563ee81ba74c917b883b10188df161dfac3667967727259c87b1a463e6fb64fe00
SHA5125b9ef9b1d25ecc2166d715e0e84d925993e0843a4b78b2dc5954600e4ce4315ce1bdf606c0ffa11fe85caed2098a6e6f028fb981784785c92dc880e49a6f6a2b