Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
03-05-2024 11:37
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-03_adbaa2c112590737aa4c54ba1afb59f3_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-05-03_adbaa2c112590737aa4c54ba1afb59f3_cryptolocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-03_adbaa2c112590737aa4c54ba1afb59f3_cryptolocker.exe
-
Size
51KB
-
MD5
adbaa2c112590737aa4c54ba1afb59f3
-
SHA1
111befb27847d27b1dedb784b808c617d518d910
-
SHA256
b5ea3d9f3e6b2cbe15ab7258e3208091d80e4e2c5b3ccc82d1d94deaa029bd64
-
SHA512
432eac9fac765acff8fdcfaabb7290ee62995a65da70ef89c9b491627e15472db0bdf999f8984f238a32f876412f1e3bc3a3a320e4eb2c9b610621e0eaa854a3
-
SSDEEP
768:79inqyNR/QtOOtEvwDpjBK/rJ+Nw8qnTHGfa:79mqyNhQMOtEvwDpjBxe8GGfa
Malware Config
Signatures
-
Detection of CryptoLocker Variants 4 IoCs
resource yara_rule behavioral1/memory/2728-0-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000d000000012336-11.dat CryptoLocker_rule2 behavioral1/memory/2728-13-0x00000000022E0000-0x00000000022EF000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2728-16-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 4 IoCs
resource yara_rule behavioral1/memory/2728-0-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral1/files/0x000d000000012336-11.dat CryptoLocker_set1 behavioral1/memory/2728-13-0x00000000022E0000-0x00000000022EF000-memory.dmp CryptoLocker_set1 behavioral1/memory/2728-16-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2588 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2728 2024-05-03_adbaa2c112590737aa4c54ba1afb59f3_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2728 wrote to memory of 2588 2728 2024-05-03_adbaa2c112590737aa4c54ba1afb59f3_cryptolocker.exe 28 PID 2728 wrote to memory of 2588 2728 2024-05-03_adbaa2c112590737aa4c54ba1afb59f3_cryptolocker.exe 28 PID 2728 wrote to memory of 2588 2728 2024-05-03_adbaa2c112590737aa4c54ba1afb59f3_cryptolocker.exe 28 PID 2728 wrote to memory of 2588 2728 2024-05-03_adbaa2c112590737aa4c54ba1afb59f3_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-03_adbaa2c112590737aa4c54ba1afb59f3_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-03_adbaa2c112590737aa4c54ba1afb59f3_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD5a5466a6c67be0bd5aa0a6c440aaa2f6b
SHA16b50af159b57e89ac8d17ca23bb6c963f3af6c60
SHA256ddd11c60eb44215f54965d66fa282e4715916672c4ef4509050f559de5f8b0a0
SHA5124cd27a6ffcd208b13073f8a9386ea8fd9a89c88a3edafc72f170a5aba8ba96011c6119ca8a027e7e4b964a4e602ec142a8b01829b991709310c8158353ce2364