Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
26/03/2024, 03:08
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-26_ffadf366f3af35c2a2271688cf0d94be_cryptolocker.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
2024-03-26_ffadf366f3af35c2a2271688cf0d94be_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-26_ffadf366f3af35c2a2271688cf0d94be_cryptolocker.exe
-
Size
50KB
-
MD5
ffadf366f3af35c2a2271688cf0d94be
-
SHA1
2389f0ebb4c72a6657521c5c425998fed805e617
-
SHA256
7d49e14fe8fc14f0ff5eb4642b1867ec755826614792bac6f1ce88060b39e5ef
-
SHA512
6a80a8d72d83270811b7ba6a0e293554a139f7d1fd4dcbd5d3d65c36b1e47707f81dd0522b1aeade2248128f8d13d24b44fe0090de105f3a6c8ced02502241c4
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/BtOOtEvwDpjBVaD3E09vxmlcXav:X6QFElP6n+gJBMOtEvwDpjBtExmlB
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000700000001220a-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000700000001220a-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2940 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2128 2024-03-26_ffadf366f3af35c2a2271688cf0d94be_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2940 2128 2024-03-26_ffadf366f3af35c2a2271688cf0d94be_cryptolocker.exe 28 PID 2128 wrote to memory of 2940 2128 2024-03-26_ffadf366f3af35c2a2271688cf0d94be_cryptolocker.exe 28 PID 2128 wrote to memory of 2940 2128 2024-03-26_ffadf366f3af35c2a2271688cf0d94be_cryptolocker.exe 28 PID 2128 wrote to memory of 2940 2128 2024-03-26_ffadf366f3af35c2a2271688cf0d94be_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-26_ffadf366f3af35c2a2271688cf0d94be_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-26_ffadf366f3af35c2a2271688cf0d94be_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD51af93a7dbfa1ad2ccd48d69526c7cc51
SHA192f2837fbc6bc8cf380331afb929c7e60c3cc5a9
SHA25643a4751e5b4875b24e581beaa29d4763e5cfb40498858c029b4bd92c89486950
SHA51209967590cf9474f563f2455545114f483766da9aa4ec4b0265c485e2503d4ee6347b79be7f356d8ae2575b130370e0c645620577d94c4eb9e5196315de394666