Analysis
-
max time kernel
162s -
max time network
175s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/03/2024, 11:51
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-14_e389184ba8d19604617a919507fad185_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-14_e389184ba8d19604617a919507fad185_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-14_e389184ba8d19604617a919507fad185_cryptolocker.exe
-
Size
54KB
-
MD5
e389184ba8d19604617a919507fad185
-
SHA1
9101c081493e5ca026b63776f221c25055ea088d
-
SHA256
17d189abfae86603969eab076b2d8e018ac685ae8131ac882db0f6f6d82d6bfb
-
SHA512
b77804ecfd041bd7abf6219660f1d358d64f4dbe2cd24abf1516796d8754fb4522dfd1e655a925283cec8264760852639275615101256af35ad035b146520505
-
SSDEEP
768:79inqyNR/QtOOtEvwDpjBK/iVTab3GRuv3VylSV/CCjgua:79mqyNhQMOtEvwDpjBPY7xv3g8Oz
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral1/memory/2984-0-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x00040000000130fc-11.dat CryptoLocker_rule2 behavioral1/memory/2984-12-0x0000000002480000-0x000000000248F000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2984-16-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2612-17-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 5 IoCs
resource yara_rule behavioral1/memory/2984-0-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral1/files/0x00040000000130fc-11.dat CryptoLocker_set1 behavioral1/memory/2984-12-0x0000000002480000-0x000000000248F000-memory.dmp CryptoLocker_set1 behavioral1/memory/2984-16-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral1/memory/2612-17-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2612 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2984 2024-03-14_e389184ba8d19604617a919507fad185_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2984 wrote to memory of 2612 2984 2024-03-14_e389184ba8d19604617a919507fad185_cryptolocker.exe 27 PID 2984 wrote to memory of 2612 2984 2024-03-14_e389184ba8d19604617a919507fad185_cryptolocker.exe 27 PID 2984 wrote to memory of 2612 2984 2024-03-14_e389184ba8d19604617a919507fad185_cryptolocker.exe 27 PID 2984 wrote to memory of 2612 2984 2024-03-14_e389184ba8d19604617a919507fad185_cryptolocker.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-14_e389184ba8d19604617a919507fad185_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-14_e389184ba8d19604617a919507fad185_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54KB
MD5453243290f4ac600a5e106dace5572d2
SHA15f89cd20f6c8f66dfc89e32f4d02cacd72ec96ed
SHA256019d9ef2f9e684ba84fb4c900aff938180b4e3ee4d308f07a827ac75fb004293
SHA512cae7151464276aedb4ece21bdfadd08f0f5d17e127721f40d34cb48c6508f45e19e79a93b41b243f4cd2aff09b8d0b93208a6ebe9686eed6649940352c3e0375