Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21/05/2024, 18:47
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-21_c9daa7b60a793b9aefaf1b25eaf6e8c6_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-21_c9daa7b60a793b9aefaf1b25eaf6e8c6_cryptolocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-21_c9daa7b60a793b9aefaf1b25eaf6e8c6_cryptolocker.exe
-
Size
49KB
-
MD5
c9daa7b60a793b9aefaf1b25eaf6e8c6
-
SHA1
924bc7d5ccd16f584d113188f0d0e91cd03aff6c
-
SHA256
c2455b14315bbf5fd0f42ca99d4fd739c25268ef30471c12b9ea67a4385f7146
-
SHA512
45ce6ccd91639e6b14a15f149e1ba73400f19e3cb222651b6d64fce08fccf94e8bc9b744fae70c2ebdf93b21b08ac7bdd874cd77a5cff07aa899af906ec4e832
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/BtOOtEvwDpjBVaD3E09vdXfV:X6QFElP6n+gJBMOtEvwDpjBtEdXfV
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000f00000001226b-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000f00000001226b-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2780 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1212 2024-05-21_c9daa7b60a793b9aefaf1b25eaf6e8c6_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1212 wrote to memory of 2780 1212 2024-05-21_c9daa7b60a793b9aefaf1b25eaf6e8c6_cryptolocker.exe 28 PID 1212 wrote to memory of 2780 1212 2024-05-21_c9daa7b60a793b9aefaf1b25eaf6e8c6_cryptolocker.exe 28 PID 1212 wrote to memory of 2780 1212 2024-05-21_c9daa7b60a793b9aefaf1b25eaf6e8c6_cryptolocker.exe 28 PID 1212 wrote to memory of 2780 1212 2024-05-21_c9daa7b60a793b9aefaf1b25eaf6e8c6_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-21_c9daa7b60a793b9aefaf1b25eaf6e8c6_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-21_c9daa7b60a793b9aefaf1b25eaf6e8c6_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD5c96ad1b8ca8baedafd3347f1641ecd11
SHA11efa9ecdd8ed1aa531258fa1e96a6866d2d4a35e
SHA25640742e0849718143af9fe59b3629152180456e4ed63fa4537bfb382966f38c48
SHA512da2720e72cbfd4d18ac5a881ca278e23e187d07eb424b50460fc8a897fa864c99de2e3e26186584e8ed87470deb1af7aa23017345a8b533419f7b3082b7b0879