Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 06:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-16_08d324a738d706b2c8055ad2c7890070_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-16_08d324a738d706b2c8055ad2c7890070_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-16_08d324a738d706b2c8055ad2c7890070_cryptolocker.exe
-
Size
39KB
-
MD5
08d324a738d706b2c8055ad2c7890070
-
SHA1
a8fec0c4fb1c3a5afd74adda4d73611a6534993a
-
SHA256
1e36cc1419f6407fda40d97c8ce8ecdd1d44814f7aae12a751bdfa733109dcb1
-
SHA512
6c86c815ef883146ac1e169f3053c8dbc32d05d912951662d1f92c1dd069a64ce3c71d9dfe658436a3c0172f06718a94865a1343ddcaf5fcf216e8fa65d38476
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBVaD3TP7DFCw0c:X6QFElP6n+gJQMOtEvwDpjBmzDU5c
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000d000000015ccd-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000d000000015ccd-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2508 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2240 2024-05-16_08d324a738d706b2c8055ad2c7890070_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2508 2240 2024-05-16_08d324a738d706b2c8055ad2c7890070_cryptolocker.exe 28 PID 2240 wrote to memory of 2508 2240 2024-05-16_08d324a738d706b2c8055ad2c7890070_cryptolocker.exe 28 PID 2240 wrote to memory of 2508 2240 2024-05-16_08d324a738d706b2c8055ad2c7890070_cryptolocker.exe 28 PID 2240 wrote to memory of 2508 2240 2024-05-16_08d324a738d706b2c8055ad2c7890070_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-16_08d324a738d706b2c8055ad2c7890070_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-16_08d324a738d706b2c8055ad2c7890070_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD5c63be862f155f826a883f8b812e18fda
SHA1991d1aa6553c70dc4c75b586c5c5074445846290
SHA25692fbb00ec78435323b82a38323e1af54b16e089520ef938c3e2e800516d38d15
SHA512a95ecede246bccb176fa78a62a905887569372a44c791e6359501c1674bce706aec0f8161a3d3a17aa3451b0a123804261ddd793b42ac60ac349f749f55dd50f