Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
12/03/2024, 05:52
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-12_ae721611d44ad41ea89bb0aac9d7f31f_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-03-12_ae721611d44ad41ea89bb0aac9d7f31f_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-12_ae721611d44ad41ea89bb0aac9d7f31f_cryptolocker.exe
-
Size
52KB
-
MD5
ae721611d44ad41ea89bb0aac9d7f31f
-
SHA1
05372e9122587675c0831935922f3113d23c10e6
-
SHA256
69c2f4bd8b8cac9e8f7e5c49d671155fdfec397a5f18f4cd4d60097823869a41
-
SHA512
5ab7095a55356393af177e90c539018cc4c2b0622abb5c16f842213abc140a8c89fd415ad3af779e0b93432357ff10baf1f4e5baf247ae9b99ebe9fb5e29ad19
-
SSDEEP
768:79inqyNR/QtOOtEvwDpjBK/rJ+Nw8qn8pKIRs5xwg4K:79mqyNhQMOtEvwDpjBxe8TpXRWcK
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral1/memory/1992-1-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000d000000012253-11.dat CryptoLocker_rule2 behavioral1/memory/1992-16-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral1/memory/1992-13-0x00000000003D0000-0x00000000003DF000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2524-18-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 5 IoCs
resource yara_rule behavioral1/memory/1992-1-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral1/files/0x000d000000012253-11.dat CryptoLocker_set1 behavioral1/memory/1992-16-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral1/memory/1992-13-0x00000000003D0000-0x00000000003DF000-memory.dmp CryptoLocker_set1 behavioral1/memory/2524-18-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2524 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1992 2024-03-12_ae721611d44ad41ea89bb0aac9d7f31f_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2524 1992 2024-03-12_ae721611d44ad41ea89bb0aac9d7f31f_cryptolocker.exe 28 PID 1992 wrote to memory of 2524 1992 2024-03-12_ae721611d44ad41ea89bb0aac9d7f31f_cryptolocker.exe 28 PID 1992 wrote to memory of 2524 1992 2024-03-12_ae721611d44ad41ea89bb0aac9d7f31f_cryptolocker.exe 28 PID 1992 wrote to memory of 2524 1992 2024-03-12_ae721611d44ad41ea89bb0aac9d7f31f_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-12_ae721611d44ad41ea89bb0aac9d7f31f_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-12_ae721611d44ad41ea89bb0aac9d7f31f_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD5626b4f58918cae72e113f7e02a6f45e1
SHA14cb2b5e89fafd1feec60f11a0a8fca4545bd36f1
SHA256666a6b718cc571a10a6be16d940c525d8cfe05a51df7986acd304663c07755b1
SHA512342f6f64419e26f8df5a9e3c1dd6617dadc83c8235a366b58a6a83957b61179a4c104bd7851abb8c1f34ca55b09a24f9c5f0cbb1fc29ac75eea00c09feb4c84c