Analysis
-
max time kernel
11s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 23:29
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-14_db9ac8ff33832978b742904588cf0e54_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-05-14_db9ac8ff33832978b742904588cf0e54_cryptolocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-14_db9ac8ff33832978b742904588cf0e54_cryptolocker.exe
-
Size
41KB
-
MD5
db9ac8ff33832978b742904588cf0e54
-
SHA1
7c4b350729cde2fa8e53e215dda095c508e74ca3
-
SHA256
7f0799ef8791d3b76e85a7427a9eaef61e67152446fddc266c3956c2e8b34c6b
-
SHA512
6a7673e19c72072a2466d386163eeb762a81ac731fa99347f11cb9b343e2a4858df139aadcbb8999f6ba1f8470e45fb8a43b3ca069bf0330ae9dabcecb223412
-
SSDEEP
384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSznHzl6AJvDSuYlmoHR8uyn:b/yC4GyNM01GuQMNXw2PSjHPbSuYlZY
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000c00000001315b-13.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2216 retln.exe -
Loads dropped DLL 1 IoCs
pid Process 2460 2024-05-14_db9ac8ff33832978b742904588cf0e54_cryptolocker.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2460 2024-05-14_db9ac8ff33832978b742904588cf0e54_cryptolocker.exe 2216 retln.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2460 wrote to memory of 2216 2460 2024-05-14_db9ac8ff33832978b742904588cf0e54_cryptolocker.exe 28 PID 2460 wrote to memory of 2216 2460 2024-05-14_db9ac8ff33832978b742904588cf0e54_cryptolocker.exe 28 PID 2460 wrote to memory of 2216 2460 2024-05-14_db9ac8ff33832978b742904588cf0e54_cryptolocker.exe 28 PID 2460 wrote to memory of 2216 2460 2024-05-14_db9ac8ff33832978b742904588cf0e54_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-14_db9ac8ff33832978b742904588cf0e54_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-14_db9ac8ff33832978b742904588cf0e54_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\retln.exe"C:\Users\Admin\AppData\Local\Temp\retln.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD54e9bcb18a665b01515b8680db6cdc6d5
SHA11649474a4a6782944f1b8f1728a84e7804a8db1c
SHA2563323539ca50ee8479874c8efdae5b49a42b41faef2350ccc40acc4cdbbf9d9ff
SHA512c513e2dc5622d96f8d0a5ab895a34310294fba95758251f2f973512fe64132c3491709cba5ad512ac9c8875ef7eb414f68e3933f618f8d23ff5943be03333992