Analysis
-
max time kernel
134s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-03-2024 16:52
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-26_fde77ea14edd4bc45b9b38be150fcf5c_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-26_fde77ea14edd4bc45b9b38be150fcf5c_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-26_fde77ea14edd4bc45b9b38be150fcf5c_cryptolocker.exe
-
Size
123KB
-
MD5
fde77ea14edd4bc45b9b38be150fcf5c
-
SHA1
b6e013ae317184526831541369f692de286f4aed
-
SHA256
7429f2e389cac58e55b91cad3edee8f3ef5afbc62029cc0c1b971c9208d9eb9d
-
SHA512
460b06f839f7b157bafdb24eb1de4c9ed01006156d8c145116a82917ba4d2305d132e3183338f2894cb6c8c080cac9e13fa4b49ba52e3773edba59f586eacd31
-
SSDEEP
1536:u6QFElP6n+gWMOtEvwDpjJGYQbN/PKwMgE3:u6a++OtEvwDpj6z2
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000900000001223d-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000900000001223d-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2824 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2076 2024-03-26_fde77ea14edd4bc45b9b38be150fcf5c_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2824 2076 2024-03-26_fde77ea14edd4bc45b9b38be150fcf5c_cryptolocker.exe 28 PID 2076 wrote to memory of 2824 2076 2024-03-26_fde77ea14edd4bc45b9b38be150fcf5c_cryptolocker.exe 28 PID 2076 wrote to memory of 2824 2076 2024-03-26_fde77ea14edd4bc45b9b38be150fcf5c_cryptolocker.exe 28 PID 2076 wrote to memory of 2824 2076 2024-03-26_fde77ea14edd4bc45b9b38be150fcf5c_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-26_fde77ea14edd4bc45b9b38be150fcf5c_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-26_fde77ea14edd4bc45b9b38be150fcf5c_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
123KB
MD57063531f831fed1d4b8c64df2ae55240
SHA1e99a85b86b568e1336878a7a49243687605f920d
SHA256edad9293ca04d8c6de30a849e6f0f4a426adc05c6589bd74053ecd9cb9a1dbb1
SHA5124ff037100aae3558ec3f916444673c300124ea9e976aeb26cef14106288fba1b2efa9acf5e6981a211f9c3663e136de48ca7108a2fdec5935681db542d3c80e2