Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/03/2024, 15:30
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-28_86c1cc1e642d68e235a77ae3c74c127a_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-28_86c1cc1e642d68e235a77ae3c74c127a_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-28_86c1cc1e642d68e235a77ae3c74c127a_cryptolocker.exe
-
Size
121KB
-
MD5
86c1cc1e642d68e235a77ae3c74c127a
-
SHA1
e9d84a574e001b4d6862a00a23c19e42b94cbcf8
-
SHA256
593e7fe15abc506e41665ee5fafff4ce0333ab932592179c2ec9ec47a8d827ff
-
SHA512
0daef86e6c3eafea61b3eb8c612b98faec30f94294b6a6f005804cf63ce5704ea603feff9b5622e031db3e0c2263dc2b45c0442e39db7aa064f3890ce647044f
-
SSDEEP
1536:u6QFElP6n+gWMOtEvwDpjJGYQbN/PKwMgeG:u6a++OtEvwDpj6zz
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000b000000012253-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000b000000012253-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2532 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2336 2024-03-28_86c1cc1e642d68e235a77ae3c74c127a_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2532 2336 2024-03-28_86c1cc1e642d68e235a77ae3c74c127a_cryptolocker.exe 28 PID 2336 wrote to memory of 2532 2336 2024-03-28_86c1cc1e642d68e235a77ae3c74c127a_cryptolocker.exe 28 PID 2336 wrote to memory of 2532 2336 2024-03-28_86c1cc1e642d68e235a77ae3c74c127a_cryptolocker.exe 28 PID 2336 wrote to memory of 2532 2336 2024-03-28_86c1cc1e642d68e235a77ae3c74c127a_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_86c1cc1e642d68e235a77ae3c74c127a_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-28_86c1cc1e642d68e235a77ae3c74c127a_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
122KB
MD582db4fd64da2836e3794fcd57dbfbc65
SHA1f9b6dec008b6f03ee38bb055ace850c27f98f4e8
SHA256dc43153a1ddae9b844646252d7bebe2612723588e7f1f05bc61db8454a7051d3
SHA512de313780c1d36b3c560321611f4db833bd17f01db314129c6e5127e95d4ee8a71d703379ec050e8d92971caa16eea4d26f79850b223e108cd161cc6d69674cf8