Analysis
-
max time kernel
135s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/03/2024, 15:51
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-14_c8b54b9a5696cba9aa572605b7be69f5_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-14_c8b54b9a5696cba9aa572605b7be69f5_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-14_c8b54b9a5696cba9aa572605b7be69f5_cryptolocker.exe
-
Size
42KB
-
MD5
c8b54b9a5696cba9aa572605b7be69f5
-
SHA1
aa0c189906106289b178db272c5db057883bbc8f
-
SHA256
679c9c7e336690ac6c011efc3b81619b0bbadbe3c6c66aa85c25f7bc6100f3b6
-
SHA512
094b027b5731dc15f567fa968c2a8c22cd2abd97cfed17dd2e2bc091e9629a439f75a9745557ec6f4f5cf4a31fcf85f462a952648e5b85e87f3fee2e57ec38ba
-
SSDEEP
768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpj/MLam5aFr7YOzzb5:V6QFElP6n+gMQMOtEvwDpjyaYaFAY
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000a000000012254-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000a000000012254-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2500 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1460 2024-03-14_c8b54b9a5696cba9aa572605b7be69f5_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1460 wrote to memory of 2500 1460 2024-03-14_c8b54b9a5696cba9aa572605b7be69f5_cryptolocker.exe 28 PID 1460 wrote to memory of 2500 1460 2024-03-14_c8b54b9a5696cba9aa572605b7be69f5_cryptolocker.exe 28 PID 1460 wrote to memory of 2500 1460 2024-03-14_c8b54b9a5696cba9aa572605b7be69f5_cryptolocker.exe 28 PID 1460 wrote to memory of 2500 1460 2024-03-14_c8b54b9a5696cba9aa572605b7be69f5_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-14_c8b54b9a5696cba9aa572605b7be69f5_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-14_c8b54b9a5696cba9aa572605b7be69f5_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD5cb6468a4251157f3f0b4273ac32dcc02
SHA16bc3779c616bf37d5d7d0b81794531bee804e712
SHA256ef34f4d838e3d8192307f8111af1f1bff9d1b77b2276c51d32f2166f46ea0fd8
SHA5120a8497453e40c000dee82c8dcf11a25c15dff3e83ad0444c471b4db766407c6f9787625277a1f32d55ba896e9a26596902ed31bd3aca112252ec30d43d1feec2