Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 05:33
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-10_aadf20ce2229ee42dda6b1829a396918_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-10_aadf20ce2229ee42dda6b1829a396918_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-10_aadf20ce2229ee42dda6b1829a396918_cryptolocker.exe
-
Size
50KB
-
MD5
aadf20ce2229ee42dda6b1829a396918
-
SHA1
770e5959c55a6b5d60c1104d971643006141d726
-
SHA256
638db3fee9f051eb950c7a72638d924fed36b3c4189ff8cdd7e92869ce9739f9
-
SHA512
ca85cc4014f0e8b943294e98dcb8fc9b46526f70c3bd9972b9bad97d4511a231f462a64c29abe128b741db6131144b792191e443e01844323640bb08c22faa30
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBaaEqbIu55id3AMWZYO:X6QFElP6n+gJQMOtEvwDpjB0GIWiWLiO
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000c000000015653-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000c000000015653-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2944 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2872 2024-05-10_aadf20ce2229ee42dda6b1829a396918_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2944 2872 2024-05-10_aadf20ce2229ee42dda6b1829a396918_cryptolocker.exe 28 PID 2872 wrote to memory of 2944 2872 2024-05-10_aadf20ce2229ee42dda6b1829a396918_cryptolocker.exe 28 PID 2872 wrote to memory of 2944 2872 2024-05-10_aadf20ce2229ee42dda6b1829a396918_cryptolocker.exe 28 PID 2872 wrote to memory of 2944 2872 2024-05-10_aadf20ce2229ee42dda6b1829a396918_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_aadf20ce2229ee42dda6b1829a396918_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-10_aadf20ce2229ee42dda6b1829a396918_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD5b7a5bf52f5c012569edd27dcd8e01455
SHA10f5f92e64aa16670b9961f84867fbddd00410447
SHA2568f5812aaf3e3a0b6579d1318b052d41ea44c4bb316b9324253f11650e1d4330d
SHA512db837abbeeea269f8a817314b18ca45a4fa1347bfb37ee5afe0944e32b6a0e90735a49ad5d641d96c424339379cf424fcfc4e52044310e442af593018493b6cf