Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
25/04/2024, 02:38
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-25_51cc29f5136fbfaf48d7dda3560e4318_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-04-25_51cc29f5136fbfaf48d7dda3560e4318_cryptolocker.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-25_51cc29f5136fbfaf48d7dda3560e4318_cryptolocker.exe
-
Size
70KB
-
MD5
51cc29f5136fbfaf48d7dda3560e4318
-
SHA1
2f03e35f1582fe1c3f4620f7f87c9569b821c0ab
-
SHA256
145e0c8db34174cec38087c35873449736e469306d9a72d3b8a705653a455ae8
-
SHA512
dd57e40e6a777b942101e1300224b34a7d5f73770141deda856c595f017e20b84a379182cf407a4cb51605d6010a91ba8f06ffca57ad2055b7e298838144b25a
-
SSDEEP
1536:Dk/xY0sllyGQMOtEvwDpjwycDtKkQZQRKb61vSbgZ3QzNKU50n:DW60sllyWOtEvwDpjwF85E
Malware Config
Signatures
-
Detection of CryptoLocker Variants 4 IoCs
resource yara_rule behavioral1/memory/3056-0-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000c000000012330-11.dat CryptoLocker_rule2 behavioral1/memory/3056-15-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2972-17-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 4 IoCs
resource yara_rule behavioral1/memory/3056-0-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_set1 behavioral1/files/0x000c000000012330-11.dat CryptoLocker_set1 behavioral1/memory/3056-15-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_set1 behavioral1/memory/2972-17-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2972 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 3056 2024-04-25_51cc29f5136fbfaf48d7dda3560e4318_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2972 3056 2024-04-25_51cc29f5136fbfaf48d7dda3560e4318_cryptolocker.exe 28 PID 3056 wrote to memory of 2972 3056 2024-04-25_51cc29f5136fbfaf48d7dda3560e4318_cryptolocker.exe 28 PID 3056 wrote to memory of 2972 3056 2024-04-25_51cc29f5136fbfaf48d7dda3560e4318_cryptolocker.exe 28 PID 3056 wrote to memory of 2972 3056 2024-04-25_51cc29f5136fbfaf48d7dda3560e4318_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_51cc29f5136fbfaf48d7dda3560e4318_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-25_51cc29f5136fbfaf48d7dda3560e4318_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD5fdfde8d485fc4f4364a1ab215e471f77
SHA140cd4477e30b165b6edb00678d9fa2aec46ac03e
SHA256fbf71af1baf6f09bbe09e670a294d0680b349e94328b26426c3138d9d88c9794
SHA5129f985811a9d8073632e86cadbec905bc1b087f3c553f33bbe6e4245a166ff019fb513cb04c507f4364f8ba0bde611dab3c70fe748846dac4ac31fbe75b220a8f