Analysis
-
max time kernel
151s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/04/2024, 06:28
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-11_dddc8ebf50b2b020d0c568ee9e9d69e7_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-11_dddc8ebf50b2b020d0c568ee9e9d69e7_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-11_dddc8ebf50b2b020d0c568ee9e9d69e7_cryptolocker.exe
-
Size
45KB
-
MD5
dddc8ebf50b2b020d0c568ee9e9d69e7
-
SHA1
96f47b79f22bd4ae34686a8f6db5a8098cc27772
-
SHA256
12dc3033098c2861e9de32711bd29a0869f33a4808aefc571ac53ce30c02e068
-
SHA512
ad314190c25ce1bd40edf5fd43a65daccfab4c7e6c2f9bd8ed2c96d8aee0943fb567725330b78ffcd708fdc7a84e27680406ff2f4350cc6da43afc39308dcf77
-
SSDEEP
768:P6LsoVEeegiZPvEhHSP+gp/QtOOtEvwDpjBBMLZdzuqpXsiE8Wq/Dpko:P6Q0ElP6G+gJQMOtEvwDpjB8WMlL
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral1/memory/2840-0-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000a000000012248-11.dat CryptoLocker_rule2 behavioral1/memory/2840-15-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_rule2 behavioral1/memory/3056-16-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_rule2 behavioral1/memory/3056-25-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 5 IoCs
resource yara_rule behavioral1/memory/2840-0-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_set1 behavioral1/files/0x000a000000012248-11.dat CryptoLocker_set1 behavioral1/memory/2840-15-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_set1 behavioral1/memory/3056-16-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_set1 behavioral1/memory/3056-25-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 3056 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2840 2024-04-11_dddc8ebf50b2b020d0c568ee9e9d69e7_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2840 wrote to memory of 3056 2840 2024-04-11_dddc8ebf50b2b020d0c568ee9e9d69e7_cryptolocker.exe 28 PID 2840 wrote to memory of 3056 2840 2024-04-11_dddc8ebf50b2b020d0c568ee9e9d69e7_cryptolocker.exe 28 PID 2840 wrote to memory of 3056 2840 2024-04-11_dddc8ebf50b2b020d0c568ee9e9d69e7_cryptolocker.exe 28 PID 2840 wrote to memory of 3056 2840 2024-04-11_dddc8ebf50b2b020d0c568ee9e9d69e7_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_dddc8ebf50b2b020d0c568ee9e9d69e7_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-11_dddc8ebf50b2b020d0c568ee9e9d69e7_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:3056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5dcb7d9c1d9abd55da42ffe75a280da96
SHA13fcf80c09199b1b5da26e042e221be62d8276c67
SHA2563742b42c471706edd7681e4487a64c34c74793a058215e5329ebadf626910a78
SHA512885a470cca36cf0bfab3526af597dd90e2895bef7091460adcb00a3b82700bf5571b64dfbfe2da17382e3b0bf202cf83d43ac7f78bdc6fa0bb627be6456780d9