Analysis
-
max time kernel
11s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-05-2024 13:29
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-15_863c83697a467db6361296e0f6900005_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-15_863c83697a467db6361296e0f6900005_cryptolocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-15_863c83697a467db6361296e0f6900005_cryptolocker.exe
-
Size
34KB
-
MD5
863c83697a467db6361296e0f6900005
-
SHA1
ea9b449b7c5ffa3ca595a52b7b23269407662e2c
-
SHA256
935def8136348cb3d809b13ac91907fa1c138f335ee66dfb231ca74dff564d00
-
SHA512
d4eb62729c2003e30e23f96ec9d27bb4f87b4eabb1920580bcbd53cb9756a1ec1510a82c809ce1546156baac1b4ba378688737ce3834bb5978251096fb2beec2
-
SSDEEP
384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSznStEkcsgR54Nv9c:b/yC4GyNM01GuQMNXw2PSjSKkcJR549c
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000d000000013a06-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 1624 retln.exe -
Loads dropped DLL 1 IoCs
pid Process 1948 2024-05-15_863c83697a467db6361296e0f6900005_cryptolocker.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1948 2024-05-15_863c83697a467db6361296e0f6900005_cryptolocker.exe 1624 retln.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1948 wrote to memory of 1624 1948 2024-05-15_863c83697a467db6361296e0f6900005_cryptolocker.exe 28 PID 1948 wrote to memory of 1624 1948 2024-05-15_863c83697a467db6361296e0f6900005_cryptolocker.exe 28 PID 1948 wrote to memory of 1624 1948 2024-05-15_863c83697a467db6361296e0f6900005_cryptolocker.exe 28 PID 1948 wrote to memory of 1624 1948 2024-05-15_863c83697a467db6361296e0f6900005_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-15_863c83697a467db6361296e0f6900005_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-15_863c83697a467db6361296e0f6900005_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\retln.exe"C:\Users\Admin\AppData\Local\Temp\retln.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD513fc71a9be2c653e5c048121d831e73c
SHA163539af2dbbed368fd401de5c413fe5ea63f1f8d
SHA25691f250f77a6ea96aa034d6b80555bdc2b71a14fbb860c2f3128ead0d0ebccbc4
SHA5124cf5546ed9194761758c9a7a02b9865b92975dee886e510037439aedba06341d77bc21bd7ad24741e5529445ca81112b92b7ea183bc61b7bab42587ce3579a05