Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-04-2024 18:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-28_0d70f23183e2b5d7275617f3ad070606_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-28_0d70f23183e2b5d7275617f3ad070606_cryptolocker.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-04-28_0d70f23183e2b5d7275617f3ad070606_cryptolocker.exe
-
Size
92KB
-
MD5
0d70f23183e2b5d7275617f3ad070606
-
SHA1
89d616f630fa5a0877ce10b0bbd15dc2078d9c08
-
SHA256
8fd45a9b832929055d6ed4053fd955b87001d9acdf209cf5b208ee57a06f8c96
-
SHA512
1d052aef250a7d50c2ee29c770c879dc3741aaddcdabd87ec2cc37493e3b6f9282ee9b60d1abb83d612ccdea83858eea29c30c90bac27df5f6964c2ff5e4da30
-
SSDEEP
1536:V6QFElP6n+gMQMOtEvwDpjQGYQbN/PKwMgL08:V6a+pOtEvwDpjtzP
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000d000000014698-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000d000000014698-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 1960 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2892 2024-04-28_0d70f23183e2b5d7275617f3ad070606_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2892 wrote to memory of 1960 2892 2024-04-28_0d70f23183e2b5d7275617f3ad070606_cryptolocker.exe 28 PID 2892 wrote to memory of 1960 2892 2024-04-28_0d70f23183e2b5d7275617f3ad070606_cryptolocker.exe 28 PID 2892 wrote to memory of 1960 2892 2024-04-28_0d70f23183e2b5d7275617f3ad070606_cryptolocker.exe 28 PID 2892 wrote to memory of 1960 2892 2024-04-28_0d70f23183e2b5d7275617f3ad070606_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_0d70f23183e2b5d7275617f3ad070606_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-28_0d70f23183e2b5d7275617f3ad070606_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:1960
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD50afce8bd8d950b04bc4ddb19f90d8339
SHA12354f89a09e9fefd5be8fbdc8abe6036ca96a33e
SHA2561ac68f238ec73eb1081e145e90f50c5835a22fcd7ec64b5f6cae3fe791ef83b6
SHA512295f51abbdf9c9a5b069c69a7aad69e204d9d98e7c40c6abe7793535584f017a1ac9ad95dba63db6fd9bb7c82ebb0c4d225b529cd7493f9667e539f06ebdff70