Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 04:00
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-10_e58279fcc8e9246456ac55d2627b1a49_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-10_e58279fcc8e9246456ac55d2627b1a49_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-10_e58279fcc8e9246456ac55d2627b1a49_cryptolocker.exe
-
Size
42KB
-
MD5
e58279fcc8e9246456ac55d2627b1a49
-
SHA1
e0d6ccbe4bb201dc548d9575c3f38209116d927a
-
SHA256
56f0c52d2ea6064ac0a35e275bfb4f6349f3bc0d65ec8536191292436e1f0ed2
-
SHA512
247d9fdc66b518bc9db3c894c95ff9c2301a6155c508c966749de256df65a96561169ebae87d86139df8ffcf59e2d8c1bc7862a64d6ceb876e0889c38f53474a
-
SSDEEP
768:b7o/2n1TCraU6GD1a4X0WcO+wMVm+slAMphql:bc/y2lkF0+Beql
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000d00000001224f-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2184 rewok.exe -
Loads dropped DLL 1 IoCs
pid Process 2336 2024-04-10_e58279fcc8e9246456ac55d2627b1a49_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2336 2024-04-10_e58279fcc8e9246456ac55d2627b1a49_cryptolocker.exe 2184 rewok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2184 2336 2024-04-10_e58279fcc8e9246456ac55d2627b1a49_cryptolocker.exe 28 PID 2336 wrote to memory of 2184 2336 2024-04-10_e58279fcc8e9246456ac55d2627b1a49_cryptolocker.exe 28 PID 2336 wrote to memory of 2184 2336 2024-04-10_e58279fcc8e9246456ac55d2627b1a49_cryptolocker.exe 28 PID 2336 wrote to memory of 2184 2336 2024-04-10_e58279fcc8e9246456ac55d2627b1a49_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-10_e58279fcc8e9246456ac55d2627b1a49_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-10_e58279fcc8e9246456ac55d2627b1a49_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\rewok.exe"C:\Users\Admin\AppData\Local\Temp\rewok.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2184
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD5875be7586537442160f55fd10dfffcf0
SHA1c5b42e1721d57499eb932749eea4c79bb463b065
SHA256126964668c20ec74dd29a2d3d4339df226c3d55f07a58da9a1791b29e95e1779
SHA51271a29594ac33ac827d2d6b63492be1e800d79f2d1c06dbeaee01a12d00998edfd5171c47cbeb2ac4368d93e4ecacfe5bd9e429f9622e6319434af46bd75b8087