Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
30/04/2024, 15:56
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-30_4e7e9fb270caeddb1b3f8efa43fcb956_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-04-30_4e7e9fb270caeddb1b3f8efa43fcb956_cryptolocker.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-04-30_4e7e9fb270caeddb1b3f8efa43fcb956_cryptolocker.exe
-
Size
42KB
-
MD5
4e7e9fb270caeddb1b3f8efa43fcb956
-
SHA1
b3f2706de8e085f1e2f73f05237e29a0e05149f2
-
SHA256
c6ba6a5fe1b984bfe9a0806c2fbf197fb5df6f816001e2b846dd8adcb43deed6
-
SHA512
6549e2e238eace6eba4b15e2f1a021819b412aa6cfc37abe6f811722d94e569def7c4ae0ff9a0d76042ac0a8e6fc59d9a2c30e2a9cf84965d0b95dda5b29b85b
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBVaD3TP7DFHuRcD9Ct1:X6QFElP6n+gJQMOtEvwDpjBmzDkWD8t1
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000c000000015cb1-21.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000c000000015cb1-21.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2712 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2768 2024-04-30_4e7e9fb270caeddb1b3f8efa43fcb956_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2768 wrote to memory of 2712 2768 2024-04-30_4e7e9fb270caeddb1b3f8efa43fcb956_cryptolocker.exe 28 PID 2768 wrote to memory of 2712 2768 2024-04-30_4e7e9fb270caeddb1b3f8efa43fcb956_cryptolocker.exe 28 PID 2768 wrote to memory of 2712 2768 2024-04-30_4e7e9fb270caeddb1b3f8efa43fcb956_cryptolocker.exe 28 PID 2768 wrote to memory of 2712 2768 2024-04-30_4e7e9fb270caeddb1b3f8efa43fcb956_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-30_4e7e9fb270caeddb1b3f8efa43fcb956_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-30_4e7e9fb270caeddb1b3f8efa43fcb956_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD5b8cb0012a74de4adcb77df8d55310b56
SHA1c9e6e4dc9d2e7b3151483918c2e859c85e0c2acb
SHA256757d78678ae930e318f276347b02adb45869028e114e2a2a143cc907644984f2
SHA512869b2deb8d378a8a7443428cb2f4a232314e930abdd221dfefd753ff1c44721eebe297aa5535c070610fbb935b830e4a2ec40c1f53db913efe5edfb49b5e06b6