Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:23
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-22_0c18fcc8db261d0aeaf42501dd917b0a_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-22_0c18fcc8db261d0aeaf42501dd917b0a_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-05-22_0c18fcc8db261d0aeaf42501dd917b0a_cryptolocker.exe
-
Size
43KB
-
MD5
0c18fcc8db261d0aeaf42501dd917b0a
-
SHA1
f20d01cc7ec8e0bf94c4a65f737a56aba8c03d5f
-
SHA256
9bbcd4171fd68ee14a27ef4c1fcc438fb304ad9a0213f91f1958656b91f11334
-
SHA512
c32ad2eb2d9d6b6613104551381718dfd8b7cebb2e613b56340e989e7a738590ff427bb2f7379d367eab6959ae913ca7c5b12b1f5fd8818a37c58da6876aeae7
-
SSDEEP
768:bCDOw9UiaKHfjnD0S16avdrQFiLjJvtAHP:bCDOw9aMDooc+vAv
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2928-0-0x0000000008000000-0x000000000800A000-memory.dmp CryptoLocker_rule2 \Users\Admin\AppData\Local\Temp\lossy.exe CryptoLocker_rule2 behavioral1/memory/2928-12-0x0000000001E50000-0x0000000001E5A000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2928-16-0x0000000008000000-0x000000000800A000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2852-26-0x0000000008000000-0x000000000800A000-memory.dmp CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
Processes:
lossy.exepid process 2852 lossy.exe -
Loads dropped DLL 1 IoCs
Processes:
2024-05-22_0c18fcc8db261d0aeaf42501dd917b0a_cryptolocker.exepid process 2928 2024-05-22_0c18fcc8db261d0aeaf42501dd917b0a_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
2024-05-22_0c18fcc8db261d0aeaf42501dd917b0a_cryptolocker.exedescription pid process target process PID 2928 wrote to memory of 2852 2928 2024-05-22_0c18fcc8db261d0aeaf42501dd917b0a_cryptolocker.exe lossy.exe PID 2928 wrote to memory of 2852 2928 2024-05-22_0c18fcc8db261d0aeaf42501dd917b0a_cryptolocker.exe lossy.exe PID 2928 wrote to memory of 2852 2928 2024-05-22_0c18fcc8db261d0aeaf42501dd917b0a_cryptolocker.exe lossy.exe PID 2928 wrote to memory of 2852 2928 2024-05-22_0c18fcc8db261d0aeaf42501dd917b0a_cryptolocker.exe lossy.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_0c18fcc8db261d0aeaf42501dd917b0a_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-22_0c18fcc8db261d0aeaf42501dd917b0a_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\lossy.exe"C:\Users\Admin\AppData\Local\Temp\lossy.exe"2⤵
- Executes dropped EXE
PID:2852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD5ef381d4e1b2c8b1fd9e493e8582e494e
SHA121750d6b454f7710d7446eb9c2d4eb022ee046ca
SHA256003e29a43529f26760e23ae4507b366f2bdaf5b10704028f9c2599551cd54548
SHA512bbac1ee46beb7b27199713434cc2533dafb9349d2088f3208421c8937c2fcf13318723d84aee9ea4e3d4016cd2dcb8d0bf6d37de7ef16b1ea05c244474d18c96