Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 05:04
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-21_870ed3c8f2502512727f4db938461974_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-21_870ed3c8f2502512727f4db938461974_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-21_870ed3c8f2502512727f4db938461974_cryptolocker.exe
-
Size
37KB
-
MD5
870ed3c8f2502512727f4db938461974
-
SHA1
ac0b54516184b6cfa870979cbace898e84b1d7dd
-
SHA256
e4317473aa8174626cbb6523e43b0a91125380239ab34ebe6620f9d5c0f97869
-
SHA512
586f16971078cb099e73eb32b7c6e0251cf8e929034ef108eb5934b760702d0e09cc946e8cd56c23ca871b12d0dac1f13347c5fb24d266ea94baaf5d432c203b
-
SSDEEP
768:b7o/2n1TCraU6GD1a4Xt9bRU6zA6o36mri:bc/y2lLRU6zA6qG
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000d0000000122eb-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2828 rewok.exe -
Loads dropped DLL 1 IoCs
pid Process 2412 2024-05-21_870ed3c8f2502512727f4db938461974_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2412 2024-05-21_870ed3c8f2502512727f4db938461974_cryptolocker.exe 2828 rewok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2828 2412 2024-05-21_870ed3c8f2502512727f4db938461974_cryptolocker.exe 28 PID 2412 wrote to memory of 2828 2412 2024-05-21_870ed3c8f2502512727f4db938461974_cryptolocker.exe 28 PID 2412 wrote to memory of 2828 2412 2024-05-21_870ed3c8f2502512727f4db938461974_cryptolocker.exe 28 PID 2412 wrote to memory of 2828 2412 2024-05-21_870ed3c8f2502512727f4db938461974_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-21_870ed3c8f2502512727f4db938461974_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-21_870ed3c8f2502512727f4db938461974_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\rewok.exe"C:\Users\Admin\AppData\Local\Temp\rewok.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD52f5dd1c694a87727a5bb464137ba9d23
SHA150985bb7be27eb283aa61587f258c1268295ba21
SHA256744799267705e31be49ff24857435d231b828afb0b24321e19a1b809a705f577
SHA5124f9b4480c270d6b00b4eb9ae3ae671f85d40f66a7a6ff374914c007f169ddee7a9b26f9681e0fc92903eb7dc34d07614b043182e41cdf4df9bfddf5ebb88cc34