Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 22:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-22_38640093143e2352527195b0ea471baa_cryptolocker.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-05-22_38640093143e2352527195b0ea471baa_cryptolocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-22_38640093143e2352527195b0ea471baa_cryptolocker.exe
-
Size
77KB
-
MD5
38640093143e2352527195b0ea471baa
-
SHA1
7d3ddec04623b65e1079fa5ba0b35b55d0847981
-
SHA256
a3d12b0f2a5198edeab28db81962ad1e2e23e33ae0c0c9ce9d477c29803626df
-
SHA512
3be367bc7ab962eec19e4d383bd69ea0a183e81cd56f7a6da3ea072dd6cd0071d0673f7e98c51dd6153181850733406a1c1b1c7fd7bda3821ec11f91d06d216e
-
SSDEEP
1536:X6QFElP6n+gJQMOtEvwDpjBZYTjipvF2bx1rHsoLkd:X6a+SOtEvwDpjBZYvQd2u
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\asih.exe CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\asih.exe CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
Processes:
asih.exepid process 2728 asih.exe -
Loads dropped DLL 1 IoCs
Processes:
2024-05-22_38640093143e2352527195b0ea471baa_cryptolocker.exepid process 1700 2024-05-22_38640093143e2352527195b0ea471baa_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
2024-05-22_38640093143e2352527195b0ea471baa_cryptolocker.exedescription pid process target process PID 1700 wrote to memory of 2728 1700 2024-05-22_38640093143e2352527195b0ea471baa_cryptolocker.exe asih.exe PID 1700 wrote to memory of 2728 1700 2024-05-22_38640093143e2352527195b0ea471baa_cryptolocker.exe asih.exe PID 1700 wrote to memory of 2728 1700 2024-05-22_38640093143e2352527195b0ea471baa_cryptolocker.exe asih.exe PID 1700 wrote to memory of 2728 1700 2024-05-22_38640093143e2352527195b0ea471baa_cryptolocker.exe asih.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_38640093143e2352527195b0ea471baa_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-22_38640093143e2352527195b0ea471baa_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD5689301c7b635ff93cf9cc75b989140e4
SHA1739be8aa89d0258a61a6d08a2c011bd31e75c708
SHA2562e4f2eb5ab56f2b8f639ec9a81a4e227dfc300af79952f02a750e56b24bf8446
SHA512ceeac42faecee6ce1c35032789d5748a6f21823644a1cdc530e03e523757d68a77f70d1a532962371c31791050a7611a4d3b0192c56246c9256088a7159cffad