Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
29/04/2024, 03:30
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-29_36b9a181c98e6ffcfb5e457c6db6d8b7_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-04-29_36b9a181c98e6ffcfb5e457c6db6d8b7_cryptolocker.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-04-29_36b9a181c98e6ffcfb5e457c6db6d8b7_cryptolocker.exe
-
Size
84KB
-
MD5
36b9a181c98e6ffcfb5e457c6db6d8b7
-
SHA1
dda3045bde468e0312016a7c30ec17f1d682fd2a
-
SHA256
b62d9eed37fe9d7a32733493a2bc1c0039a66c0010a95c9cb5ec1c0d637dc27f
-
SHA512
05d3368950f9201e97b4f5a4fa812a3ef2d9629e27a6138b8df75a180ebaa1e3b72218de3a5dd2b16ee28029d51daa31cc4ca005601e5d42fffca8621cbe889e
-
SSDEEP
768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpj/MLa5VccPtNw5CS95yFPnjX:V6QFElP6n+gMQMOtEvwDpjyaLccVNld
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000c00000001225d-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000c00000001225d-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2120 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1640 2024-04-29_36b9a181c98e6ffcfb5e457c6db6d8b7_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2120 1640 2024-04-29_36b9a181c98e6ffcfb5e457c6db6d8b7_cryptolocker.exe 28 PID 1640 wrote to memory of 2120 1640 2024-04-29_36b9a181c98e6ffcfb5e457c6db6d8b7_cryptolocker.exe 28 PID 1640 wrote to memory of 2120 1640 2024-04-29_36b9a181c98e6ffcfb5e457c6db6d8b7_cryptolocker.exe 28 PID 1640 wrote to memory of 2120 1640 2024-04-29_36b9a181c98e6ffcfb5e457c6db6d8b7_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-29_36b9a181c98e6ffcfb5e457c6db6d8b7_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-29_36b9a181c98e6ffcfb5e457c6db6d8b7_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2120
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85KB
MD53755522afbf3e74d05da4ad38b8dca12
SHA1464149d8267dc4eac9a34462141c8e5e341a4196
SHA2560b5074db853d734dcab8ac1c346c9ae533daea71ebdd2a96a786aea68f488813
SHA5120af35f9cb871933f0041ab407aaed719df1a0cbf63c450f234a1b666ad974119a1106da6458b7c3c9990d466e8818338a0d42ef4e8cd27d2d416fd95e153c2e4