Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 03:54
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-02_2775b47dec9ddbe4efbf9aa3e3364079_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-05-02_2775b47dec9ddbe4efbf9aa3e3364079_cryptolocker.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-05-02_2775b47dec9ddbe4efbf9aa3e3364079_cryptolocker.exe
-
Size
5.5MB
-
MD5
2775b47dec9ddbe4efbf9aa3e3364079
-
SHA1
b8baed685ef76713724b5e8cd05d9fb676debe8d
-
SHA256
b882164a1cedcbfc129807c9d605da75a4e3a169082afc5d1ad03561e84372b8
-
SHA512
41f952c84ee4430e67bd7b1fcce70d99f7e7d90f93aa2c7d52cd3c849760401d9c528403b3357d4c4b246802d30efa8628343610490cf4e4a707300dceb1cf7f
-
SSDEEP
98304:ot1QKvyjzO6B3DenIMmzyxD++XsBq+JUieGNt3sB/a1Ed9m+Uff:otTvgz73XMpxDbcwYvt3sFa4Of
Malware Config
Signatures
-
Detection of CryptoLocker Variants 9 IoCs
resource yara_rule behavioral1/memory/2184-0-0x0000000008000000-0x0000000008884000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2184-6-0x0000000008000000-0x0000000008884000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2184-15-0x0000000008000000-0x0000000008884000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2184-17-0x0000000008000000-0x0000000008884000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000b000000013417-19.dat CryptoLocker_rule2 behavioral1/memory/2524-25-0x0000000008000000-0x0000000008884000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2184-24-0x0000000008000000-0x0000000008884000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2524-33-0x0000000008000000-0x0000000008884000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2524-41-0x0000000008000000-0x0000000008884000-memory.dmp CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2524 lossy.exe -
Loads dropped DLL 1 IoCs
pid Process 2184 2024-05-02_2775b47dec9ddbe4efbf9aa3e3364079_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2184 2024-05-02_2775b47dec9ddbe4efbf9aa3e3364079_cryptolocker.exe 2524 lossy.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2524 2184 2024-05-02_2775b47dec9ddbe4efbf9aa3e3364079_cryptolocker.exe 28 PID 2184 wrote to memory of 2524 2184 2024-05-02_2775b47dec9ddbe4efbf9aa3e3364079_cryptolocker.exe 28 PID 2184 wrote to memory of 2524 2184 2024-05-02_2775b47dec9ddbe4efbf9aa3e3364079_cryptolocker.exe 28 PID 2184 wrote to memory of 2524 2184 2024-05-02_2775b47dec9ddbe4efbf9aa3e3364079_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-02_2775b47dec9ddbe4efbf9aa3e3364079_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-02_2775b47dec9ddbe4efbf9aa3e3364079_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\lossy.exe"C:\Users\Admin\AppData\Local\Temp\lossy.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.5MB
MD517f0f056a97c118942e46c219a464b30
SHA16d15710bc4a5c4fdfaa737bd6c18156eaefd8047
SHA256c96f3633ea7159c841137d8a403b97675ae8d5fe9a48c9d6264bbd2c11d5d0ca
SHA512a20cc30683ed1b6835601c34030488d27effae754d5f9d213ea648af6e654ec010c705aa3c5b7128f803f3b7ba7d9b453d9cc0733c14c0fee8807bc223c6057e