Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 07:36
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-15_8e15acd883955f8c2b6d84a8ed8d9676_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-03-15_8e15acd883955f8c2b6d84a8ed8d9676_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-15_8e15acd883955f8c2b6d84a8ed8d9676_cryptolocker.exe
-
Size
122KB
-
MD5
8e15acd883955f8c2b6d84a8ed8d9676
-
SHA1
ab4d477aac7429bbf5881de67bbe984d9c262212
-
SHA256
35f8a4328b35a6f226e8865038b607f29ef28d2bd6e2059c07161447ccf2d54f
-
SHA512
43727f1803f9bcf405412874c8e2caa5acd089116d55b6356f2f71214efbc9778a5936706e467a14f68ea03f86865884040d72f0fb0fc5bba3adffa379f75177
-
SSDEEP
1536:u6QFElP6n+gWMOtEvwDpjJGYQbN/PKwMg5:u6a++OtEvwDpj6zt
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000900000001224d-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000900000001224d-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 3012 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 3028 2024-03-15_8e15acd883955f8c2b6d84a8ed8d9676_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3028 wrote to memory of 3012 3028 2024-03-15_8e15acd883955f8c2b6d84a8ed8d9676_cryptolocker.exe 28 PID 3028 wrote to memory of 3012 3028 2024-03-15_8e15acd883955f8c2b6d84a8ed8d9676_cryptolocker.exe 28 PID 3028 wrote to memory of 3012 3028 2024-03-15_8e15acd883955f8c2b6d84a8ed8d9676_cryptolocker.exe 28 PID 3028 wrote to memory of 3012 3028 2024-03-15_8e15acd883955f8c2b6d84a8ed8d9676_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-15_8e15acd883955f8c2b6d84a8ed8d9676_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-15_8e15acd883955f8c2b6d84a8ed8d9676_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
122KB
MD59a1ba50004a44b18752f02202d968340
SHA1357292ef4e020cad2caddb257330bbbc85ea49a8
SHA2562f79652305ca68c53607f3e0ac91df6f0ba990df3e1dba4351cc6ea878b969c5
SHA512ea8fdefc20d90d7eb037dc919c5cbf4f9d6962641893443ad17d14660550e0ea35bf27bb4d422b9bd01c65153fa80bcb804a9ce164ffe269b8617946fa053bd7