Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/04/2024, 03:29
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-25_16ca67fdafdc2cc0136ce0726c6d2580_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-04-25_16ca67fdafdc2cc0136ce0726c6d2580_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-25_16ca67fdafdc2cc0136ce0726c6d2580_cryptolocker.exe
-
Size
46KB
-
MD5
16ca67fdafdc2cc0136ce0726c6d2580
-
SHA1
4afab2f87ff79eeb57554594948142a6baa67b0c
-
SHA256
db7b94cd8685cefa7b465cfb858afcf09c5febdfe0b29dbf2554d59649c927b6
-
SHA512
3cb61a0cb17a00fb680dabfada04569a2aeb4176877b7cb35e63164683db5b3bd39e7521b28d28109fc4ad87203b8a364ac1fb9c092e3322a4862b1895d3c1c4
-
SSDEEP
384:e/4wODQkzonAYsju5N/surDQtOOtEvwDpjqIGROqS/WccJVJwi2B5oCCM8CLW2VV:79inqyNR/QtOOtEvwDpjBKccJVODvy3s
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral1/memory/1540-0-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral1/memory/1540-13-0x0000000002840000-0x000000000284F000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000a000000013a21-16.dat CryptoLocker_rule2 behavioral1/memory/2208-17-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral1/memory/1540-15-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 5 IoCs
resource yara_rule behavioral1/memory/1540-0-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral1/memory/1540-13-0x0000000002840000-0x000000000284F000-memory.dmp CryptoLocker_set1 behavioral1/files/0x000a000000013a21-16.dat CryptoLocker_set1 behavioral1/memory/2208-17-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral1/memory/1540-15-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2208 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1540 2024-04-25_16ca67fdafdc2cc0136ce0726c6d2580_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1540 wrote to memory of 2208 1540 2024-04-25_16ca67fdafdc2cc0136ce0726c6d2580_cryptolocker.exe 28 PID 1540 wrote to memory of 2208 1540 2024-04-25_16ca67fdafdc2cc0136ce0726c6d2580_cryptolocker.exe 28 PID 1540 wrote to memory of 2208 1540 2024-04-25_16ca67fdafdc2cc0136ce0726c6d2580_cryptolocker.exe 28 PID 1540 wrote to memory of 2208 1540 2024-04-25_16ca67fdafdc2cc0136ce0726c6d2580_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_16ca67fdafdc2cc0136ce0726c6d2580_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-25_16ca67fdafdc2cc0136ce0726c6d2580_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD589447c3924bdd7e4a65cbba56bece659
SHA1ab61efe37ea4a0a64578edc23088f04bd55e36a7
SHA256960104dc4ccecbb2001013608356a60401839bcfd7d5f4a3f206741fae39dbf8
SHA512b5a63db7cece133b94c92df00b2301ac03769ace47d8e1cd949fd4f63a97f1df30e4821b4d8f1b6f6a76fd75f5df379362af3aa3037b03c6d4f8e241af4b16b0