Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
12/03/2024, 21:24
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-12_22fb7a1a8d06613c2b9012eb1676dda0_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-03-12_22fb7a1a8d06613c2b9012eb1676dda0_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-12_22fb7a1a8d06613c2b9012eb1676dda0_cryptolocker.exe
-
Size
69KB
-
MD5
22fb7a1a8d06613c2b9012eb1676dda0
-
SHA1
b137df13c122146eccc209d9ca0ba76ebcb834a0
-
SHA256
490f5128ce004258761c92a8d2a5c45d3ce1832db1e3071c570ad7e9d5b981bf
-
SHA512
a5bb83498cf98c4e238cdab06a26032d6fc068fcd00bb1fb94368e028db63de7bc6ff21f4a195d64bdb738c31fa5b88bcada573e764c3919ddd1773443ee4519
-
SSDEEP
1536:Dk/xY0sllyGQMOtEvwDpjwycDtKkQZQRKb61vSbgZ3QzNKUsM0:DW60sllyWOtEvwDpjwF85u
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral1/memory/2244-0-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x00090000000155ed-11.dat CryptoLocker_rule2 behavioral1/memory/2244-16-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2244-15-0x00000000005B0000-0x00000000005BB000-memory.dmp CryptoLocker_rule2 behavioral1/memory/1156-18-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 4 IoCs
resource yara_rule behavioral1/memory/2244-0-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_set1 behavioral1/files/0x00090000000155ed-11.dat CryptoLocker_set1 behavioral1/memory/2244-16-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_set1 behavioral1/memory/1156-18-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 1156 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2244 2024-03-12_22fb7a1a8d06613c2b9012eb1676dda0_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2244 wrote to memory of 1156 2244 2024-03-12_22fb7a1a8d06613c2b9012eb1676dda0_cryptolocker.exe 28 PID 2244 wrote to memory of 1156 2244 2024-03-12_22fb7a1a8d06613c2b9012eb1676dda0_cryptolocker.exe 28 PID 2244 wrote to memory of 1156 2244 2024-03-12_22fb7a1a8d06613c2b9012eb1676dda0_cryptolocker.exe 28 PID 2244 wrote to memory of 1156 2244 2024-03-12_22fb7a1a8d06613c2b9012eb1676dda0_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-12_22fb7a1a8d06613c2b9012eb1676dda0_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-12_22fb7a1a8d06613c2b9012eb1676dda0_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:1156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69KB
MD5031699a7df04a36d0bd7d31a43cd14ca
SHA1cdcaed8080095a38b95375fc44c5b4aba24ddbaa
SHA2566f699651b128fb8b81d5245b0144a28b0c84800e87be050fc94e89991efc6c73
SHA5128cb5d42264967ecb1a927993c8484ee4653293e78e9438b9c4a27f8bfe3f89ff1a8b471062d5251bf49750fe64ed955882587838cf5c0e52e9a753a060741502