Analysis
-
max time kernel
134s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21/04/2024, 05:45
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-21_868551eec720d6662f619ae14d09cbad_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-21_868551eec720d6662f619ae14d09cbad_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-21_868551eec720d6662f619ae14d09cbad_cryptolocker.exe
-
Size
85KB
-
MD5
868551eec720d6662f619ae14d09cbad
-
SHA1
4328ecb5c744bca196dd3168051230867c8e5f0e
-
SHA256
9d809fcc1899691a7fa4877bc8e5314ce6ede3488e9de9764de1fb4885222553
-
SHA512
f0b421b9e7f80978aa203872c821c7fadee091b3de1d05e673f856da96558dda4b896833ceb39bd27faf6d4dec43c370aeb71fb8601f4242aee92d46604c66ee
-
SSDEEP
768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpj/MLa5VccPtNw5CS95yFPnYg:V6QFElP6n+gMQMOtEvwDpjyaLccVNl6g
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000900000001223d-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000900000001223d-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2812 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1556 2024-04-21_868551eec720d6662f619ae14d09cbad_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1556 wrote to memory of 2812 1556 2024-04-21_868551eec720d6662f619ae14d09cbad_cryptolocker.exe 28 PID 1556 wrote to memory of 2812 1556 2024-04-21_868551eec720d6662f619ae14d09cbad_cryptolocker.exe 28 PID 1556 wrote to memory of 2812 1556 2024-04-21_868551eec720d6662f619ae14d09cbad_cryptolocker.exe 28 PID 1556 wrote to memory of 2812 1556 2024-04-21_868551eec720d6662f619ae14d09cbad_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_868551eec720d6662f619ae14d09cbad_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-21_868551eec720d6662f619ae14d09cbad_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85KB
MD5bfb20ee1953b4fc8deb00f120dd432a7
SHA1d8695c353f1004153153a222ad4843b07449b5ce
SHA25698308e3a4eb691ec916a9af54fe77ae8b8b125b0a3e9648f85d1f6ba5a05071a
SHA512173e80ffc9daacc217b8df87db173d0175e7743ed4337214a9c274dacd5568c6ea761a25c57c317c24ef7e997c5057c3260e6edd0619928030a59230a1019756