Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 15:49
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-16_88bfaad0bbee8739fb50df4cbf2fa251_cryptolocker.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-05-16_88bfaad0bbee8739fb50df4cbf2fa251_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-16_88bfaad0bbee8739fb50df4cbf2fa251_cryptolocker.exe
-
Size
48KB
-
MD5
88bfaad0bbee8739fb50df4cbf2fa251
-
SHA1
62585369847ba70e0b2b3461b697a9354ecc98f8
-
SHA256
a228fdab92f56e0d5295725ace9bf79584c73abf3fc6a1197e3c00b8ef7c99db
-
SHA512
ea93a4bc0d867ea8bbfbbdecd6f2c551fde352e667a75894da756f388ce3428c827f61a389e7bb0256ef2a568fcc6f7453506508628664500e0319b74d42b271
-
SSDEEP
768:bIDOw9UiaCHfjnE0Sf88AvvP1oghYvm9/6D8jnPx9UnuDLlD+c:bIDOw9a0Dwo3P1ojvUSD4PInyDp
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000e000000012279-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2712 lossy.exe -
Loads dropped DLL 1 IoCs
pid Process 3008 2024-05-16_88bfaad0bbee8739fb50df4cbf2fa251_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3008 wrote to memory of 2712 3008 2024-05-16_88bfaad0bbee8739fb50df4cbf2fa251_cryptolocker.exe 28 PID 3008 wrote to memory of 2712 3008 2024-05-16_88bfaad0bbee8739fb50df4cbf2fa251_cryptolocker.exe 28 PID 3008 wrote to memory of 2712 3008 2024-05-16_88bfaad0bbee8739fb50df4cbf2fa251_cryptolocker.exe 28 PID 3008 wrote to memory of 2712 3008 2024-05-16_88bfaad0bbee8739fb50df4cbf2fa251_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-16_88bfaad0bbee8739fb50df4cbf2fa251_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-16_88bfaad0bbee8739fb50df4cbf2fa251_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\lossy.exe"C:\Users\Admin\AppData\Local\Temp\lossy.exe"2⤵
- Executes dropped EXE
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD53e2fe3d68ab1273ba95253520a43101e
SHA1d43e5d5d6061b3d73c454ef46dce685ff0997d12
SHA2566d288e791b44620a0578db5bb7765509d6f8d20680a6dc6f2e8680d1fbe5e4e5
SHA512e527c98d027daa9f733bac63b59979f003844fa9846de16f5d24cd35f46c4bae1df52cf232f7edf9432839cb1916829698c2b368ed6e72a6280f395775e446d0