Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/04/2024, 19:04
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-10_e4cf25279298ea6fc86b4d0395722166_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-10_e4cf25279298ea6fc86b4d0395722166_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-10_e4cf25279298ea6fc86b4d0395722166_cryptolocker.exe
-
Size
63KB
-
MD5
e4cf25279298ea6fc86b4d0395722166
-
SHA1
00ddd8e12958f6e122fa6fb227c66a1742d4ae03
-
SHA256
ef57d3265cdf46f2cbb2fcae0089b8b2afd2c521972a561e8f2daf4d8b5a135e
-
SHA512
d132403d966d57d191eee5899aa3d81d11044b9faa95dc424558fde8fb12700ba5ac2cbda1ff13fc615ce1b35c5b4b11b2203b8a3ed3f3648e2793890ead8113
-
SSDEEP
1536:X6QFElP6n+gJQMOtEvwDpjBccD2RuoNmuBLZ/xblzod:X6a+SOtEvwDpjBrO8
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000b000000012256-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000b000000012256-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2272 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2164 2024-04-10_e4cf25279298ea6fc86b4d0395722166_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2272 2164 2024-04-10_e4cf25279298ea6fc86b4d0395722166_cryptolocker.exe 28 PID 2164 wrote to memory of 2272 2164 2024-04-10_e4cf25279298ea6fc86b4d0395722166_cryptolocker.exe 28 PID 2164 wrote to memory of 2272 2164 2024-04-10_e4cf25279298ea6fc86b4d0395722166_cryptolocker.exe 28 PID 2164 wrote to memory of 2272 2164 2024-04-10_e4cf25279298ea6fc86b4d0395722166_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-10_e4cf25279298ea6fc86b4d0395722166_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-10_e4cf25279298ea6fc86b4d0395722166_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD568336ae2504cf6ef65eee57280eef667
SHA14eb029f0921512ff2096c1f756a19a883634f3c3
SHA256a375e5d76eb2532269fe132e82a1e3784e266e319b4ccf6bbbc88519fa61a529
SHA512ad36e34659a56f415820c7026288f7ad8dce57874f5fbf977c97bf9cd7e528383c752fcb8f9c87fed23c7960f79e2f56c6aa552889cf9ae2dc6d5f30f1c62be8