Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
22-04-2024 19:39
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-22_b45720c69116c2f8d517c5d51a8d2fae_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-04-22_b45720c69116c2f8d517c5d51a8d2fae_cryptolocker.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-22_b45720c69116c2f8d517c5d51a8d2fae_cryptolocker.exe
-
Size
60KB
-
MD5
b45720c69116c2f8d517c5d51a8d2fae
-
SHA1
a4220a9a2a31e5f1c1f45f2ea88833617235efdf
-
SHA256
e6ca5fc7bc5b0bd35d7996e7b2fd9f42b624a4c62bd8d725b9bf2c95c4db5de4
-
SHA512
4b00cfc107b5fe5856c0e051e8e80457cced7f422cc0c8f37b5820db0610b32a825d0a2f9d1be83ea77d62d0e6888cc8e63d206adee317dd8365c442cf6c613a
-
SSDEEP
1536:X6QFElP6n+gJQMOtEvwDpjBccD2RuoNmuBLZ/xXcS:X6a+SOtEvwDpjBrOR
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000c00000001225d-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000c00000001225d-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2288 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2176 2024-04-22_b45720c69116c2f8d517c5d51a8d2fae_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2288 2176 2024-04-22_b45720c69116c2f8d517c5d51a8d2fae_cryptolocker.exe 28 PID 2176 wrote to memory of 2288 2176 2024-04-22_b45720c69116c2f8d517c5d51a8d2fae_cryptolocker.exe 28 PID 2176 wrote to memory of 2288 2176 2024-04-22_b45720c69116c2f8d517c5d51a8d2fae_cryptolocker.exe 28 PID 2176 wrote to memory of 2288 2176 2024-04-22_b45720c69116c2f8d517c5d51a8d2fae_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_b45720c69116c2f8d517c5d51a8d2fae_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-22_b45720c69116c2f8d517c5d51a8d2fae_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2288
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD517bfa9411e2a5a778ccb798c9127012b
SHA1978f9db98b260e90fe5c67da562ecec9e0172989
SHA25632f3361439f8ec9117259fb5a371dee7663fa33d132bf8724b17c07a4963ce3e
SHA512b2f15ce436b8cee78b6ddccd800d92219d6c349114cae1b00594aa9502269e6e8592fe385897afd3e5f1fd4707372f0c7f55718035dd5fc3901e99cb6a87fc47