Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/04/2024, 23:30
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-20_4c988ebe76dd482c4ff3b1b1c3a2899f_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-20_4c988ebe76dd482c4ff3b1b1c3a2899f_cryptolocker.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-20_4c988ebe76dd482c4ff3b1b1c3a2899f_cryptolocker.exe
-
Size
46KB
-
MD5
4c988ebe76dd482c4ff3b1b1c3a2899f
-
SHA1
b969447bde10e25ae356b6474af1bb93c868d1db
-
SHA256
6c643d472ea2d49af2cf07145625ee0eb51bc0e90674b555f71ff8a6e04ad8fd
-
SHA512
a4f7b62e5a145beabf6ba46a9646017b7c4da5a7641a7cdffd96fa353ca4ebaca9b6d145a1fcaaa06a5a4b489c6155ba9bcb233ad0e5e75dd7979ed8f52d3748
-
SSDEEP
384:e/4wODQkzonAYsju5N/surDQtOOtEvwDpjqIGROqS/WccJVJwi2B5oCCM8CLW2VT:79inqyNR/QtOOtEvwDpjBKccJVODvy3e
Malware Config
Signatures
-
Detection of CryptoLocker Variants 4 IoCs
resource yara_rule behavioral1/memory/2792-0-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000b000000012251-11.dat CryptoLocker_rule2 behavioral1/memory/2792-15-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2236-20-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 4 IoCs
resource yara_rule behavioral1/memory/2792-0-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral1/files/0x000b000000012251-11.dat CryptoLocker_set1 behavioral1/memory/2792-15-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral1/memory/2236-20-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2236 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2792 2024-04-20_4c988ebe76dd482c4ff3b1b1c3a2899f_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2236 2792 2024-04-20_4c988ebe76dd482c4ff3b1b1c3a2899f_cryptolocker.exe 28 PID 2792 wrote to memory of 2236 2792 2024-04-20_4c988ebe76dd482c4ff3b1b1c3a2899f_cryptolocker.exe 28 PID 2792 wrote to memory of 2236 2792 2024-04-20_4c988ebe76dd482c4ff3b1b1c3a2899f_cryptolocker.exe 28 PID 2792 wrote to memory of 2236 2792 2024-04-20_4c988ebe76dd482c4ff3b1b1c3a2899f_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-20_4c988ebe76dd482c4ff3b1b1c3a2899f_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-20_4c988ebe76dd482c4ff3b1b1c3a2899f_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD5954289206048e154eefd51a975004baa
SHA1832c9dbfec5ab4f44559d234a5b53636d542775b
SHA256c29d65ca28028d2ee5a260cf7156b586f09ec7320c483b2c9c167a53e7f8106a
SHA512485a949c7e3a43bb499bfe5e5be23fb80d9e6ada2537421289e3ebc4bb9ba8c09f82f4df19e38024b9381861dbe245d815971a9b5f1513814b4d62e6ae16caaf