Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/03/2024, 04:37
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-28_51e1bca78bb9e6e99b198ab7cd74e97b_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-28_51e1bca78bb9e6e99b198ab7cd74e97b_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-28_51e1bca78bb9e6e99b198ab7cd74e97b_cryptolocker.exe
-
Size
45KB
-
MD5
51e1bca78bb9e6e99b198ab7cd74e97b
-
SHA1
c59e3a5eb588da1935bd75b910cd797d52f1cce9
-
SHA256
24512ca4826c41f53900f852efc8b90ab985e4285f3ba1324074996a6a5add41
-
SHA512
edda67a8c32b3775039e9ae56dc8df669f05de41e93194bfd3c6cf5f3d1dd000da52b422df32578e522c42b01fb90b93dbfb2ffcabba5378bf822f99ec76f5b0
-
SSDEEP
768:79inqyNR/QtOOtEvwDpjBKccJVODvyLUVmK:79mqyNhQMOtEvwDpjBzckp7
Malware Config
Signatures
-
Detection of CryptoLocker Variants 3 IoCs
resource yara_rule behavioral1/memory/2240-0-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000b000000012267-11.dat CryptoLocker_rule2 behavioral1/memory/2240-15-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 3 IoCs
resource yara_rule behavioral1/memory/2240-0-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral1/files/0x000b000000012267-11.dat CryptoLocker_set1 behavioral1/memory/2240-15-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2760 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2240 2024-03-28_51e1bca78bb9e6e99b198ab7cd74e97b_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2760 2240 2024-03-28_51e1bca78bb9e6e99b198ab7cd74e97b_cryptolocker.exe 28 PID 2240 wrote to memory of 2760 2240 2024-03-28_51e1bca78bb9e6e99b198ab7cd74e97b_cryptolocker.exe 28 PID 2240 wrote to memory of 2760 2240 2024-03-28_51e1bca78bb9e6e99b198ab7cd74e97b_cryptolocker.exe 28 PID 2240 wrote to memory of 2760 2240 2024-03-28_51e1bca78bb9e6e99b198ab7cd74e97b_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_51e1bca78bb9e6e99b198ab7cd74e97b_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-28_51e1bca78bb9e6e99b198ab7cd74e97b_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD51e310faf5a4f2051fce5d30e2bf015dd
SHA10e5842c197e251384ed221f00a514b844ace46c5
SHA256e8275a098961134652291fabcd98694e6209ef0f6511a15bcb24b511c2f723ca
SHA512b7f1c32c1d72c125d39fccde3d346d67a1a2b2a308103016242b7e92408894d4bfae3e8c866fff47dab64ec5816f9b659bd4a218d3b15c7a87e91bafb8347ca0