Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
05/04/2024, 02:38
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-05_5eb5b7d30572b481c19be260fe4098e2_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-04-05_5eb5b7d30572b481c19be260fe4098e2_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-05_5eb5b7d30572b481c19be260fe4098e2_cryptolocker.exe
-
Size
53KB
-
MD5
5eb5b7d30572b481c19be260fe4098e2
-
SHA1
d864fa73042b9a0022e5e518493cab01ea4b5238
-
SHA256
9a734f70f5c55e0bdf60482604caa35504a37d3a4e3da9d5b147b53c1cc62fde
-
SHA512
1e0651cc2e365067cd62fcf38295ebff3c54956bf09a31974d60bbf0784e74444be5ce570cd298624b3060fafa06c488ccba3c2eb1671e5825fce1ee62e1ab9f
-
SSDEEP
768:bIDOw9UiaCHfjnE0Sfa7ilR0p9u6p4ICNBCXK9gE1NImsjj:bIDOw9a0DwitDZzwI9j
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000c000000012253-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2560 lossy.exe -
Loads dropped DLL 1 IoCs
pid Process 2872 2024-04-05_5eb5b7d30572b481c19be260fe4098e2_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2560 2872 2024-04-05_5eb5b7d30572b481c19be260fe4098e2_cryptolocker.exe 28 PID 2872 wrote to memory of 2560 2872 2024-04-05_5eb5b7d30572b481c19be260fe4098e2_cryptolocker.exe 28 PID 2872 wrote to memory of 2560 2872 2024-04-05_5eb5b7d30572b481c19be260fe4098e2_cryptolocker.exe 28 PID 2872 wrote to memory of 2560 2872 2024-04-05_5eb5b7d30572b481c19be260fe4098e2_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-05_5eb5b7d30572b481c19be260fe4098e2_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-05_5eb5b7d30572b481c19be260fe4098e2_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\lossy.exe"C:\Users\Admin\AppData\Local\Temp\lossy.exe"2⤵
- Executes dropped EXE
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD55dc482ba954ae2d5baddc796f3fd9707
SHA137fa777126207f011de8d95a1e6d335aa9e5e39d
SHA256ab1a60cb32d6cd7eed33a3f9b2450393a6fc4176bb05e869640a77a82ca9f5ad
SHA51267109aff1d58c4721c058347e2da4bedf1cdbddd7f0cdea34b98bfb0f15dc72241a89c55f7da99056554c73702c1d36239aa6bc12bedbb2d9200f4aa59ef63c3