Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/04/2024, 22:32
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-04_9babdea2fb081f3221f91b7c4065f968_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-04_9babdea2fb081f3221f91b7c4065f968_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-04_9babdea2fb081f3221f91b7c4065f968_cryptolocker.exe
-
Size
49KB
-
MD5
9babdea2fb081f3221f91b7c4065f968
-
SHA1
9fe3cc32d40d0930cf62e4c7d0c10f9809ad3191
-
SHA256
289553cf15469c4628d2e04225fe25386a4a401b8b182e8488cacc9887ce40e6
-
SHA512
45970afe75e347987127ebf1202c719c1860a850448026da412553254a793469ce01c6200b4d302f93132b2d460e835da91f3844af359bc53b2f9203999c00d0
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBaaEqbIu55id3AMWZcL:X6QFElP6n+gJQMOtEvwDpjB0GIWiWLOL
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000d000000012256-13.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000d000000012256-13.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2116 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2208 2024-04-04_9babdea2fb081f3221f91b7c4065f968_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2116 2208 2024-04-04_9babdea2fb081f3221f91b7c4065f968_cryptolocker.exe 28 PID 2208 wrote to memory of 2116 2208 2024-04-04_9babdea2fb081f3221f91b7c4065f968_cryptolocker.exe 28 PID 2208 wrote to memory of 2116 2208 2024-04-04_9babdea2fb081f3221f91b7c4065f968_cryptolocker.exe 28 PID 2208 wrote to memory of 2116 2208 2024-04-04_9babdea2fb081f3221f91b7c4065f968_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-04_9babdea2fb081f3221f91b7c4065f968_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-04_9babdea2fb081f3221f91b7c4065f968_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD5f82afc81535ec9c23d3f06e02401485c
SHA1d9f9e1126803674abb979d4f3377ec6a5e1c9322
SHA256609fe55c9ecb8d254f2e2b9c6298f8acf4aa35bef7bb63c282dfb2da08fba45f
SHA512ec296d8d19849090b1bf06df268957d9ed4282bdb8cef9ffe3fa650006a32d9dff4a5d78428328121463e13532dca7e2f353a67a29288c25cf751ed48cbe21c9