Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 05:37
Behavioral task
behavioral1
Sample
20240521c1ac511a14d3e82f1569a83f0c9472edcryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
20240521c1ac511a14d3e82f1569a83f0c9472edcryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
20240521c1ac511a14d3e82f1569a83f0c9472edcryptolocker.exe
-
Size
77KB
-
MD5
c1ac511a14d3e82f1569a83f0c9472ed
-
SHA1
10671667599cfd869ce104348429780c90e22a63
-
SHA256
cf015c28f91e127dca35b20a448ae188c55cbf4d168953cd4d6bedd76dde95f4
-
SHA512
7393f6e0317d3229cf54ac932a31bd640d610a9e3925550cc3a6360728f632e167fc3793077ffcc32043101895972dee93d0d3b6b10a7b4f1507e2679483ab6e
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxp:T6a+rdOOtEvwDpjNtHPy
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2668 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2196 20240521c1ac511a14d3e82f1569a83f0c9472edcryptolocker.exe -
resource yara_rule behavioral1/memory/2196-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x000d00000001227e-11.dat upx behavioral1/memory/2196-15-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2668-16-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2668-25-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2668 2196 20240521c1ac511a14d3e82f1569a83f0c9472edcryptolocker.exe 28 PID 2196 wrote to memory of 2668 2196 20240521c1ac511a14d3e82f1569a83f0c9472edcryptolocker.exe 28 PID 2196 wrote to memory of 2668 2196 20240521c1ac511a14d3e82f1569a83f0c9472edcryptolocker.exe 28 PID 2196 wrote to memory of 2668 2196 20240521c1ac511a14d3e82f1569a83f0c9472edcryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\20240521c1ac511a14d3e82f1569a83f0c9472edcryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\20240521c1ac511a14d3e82f1569a83f0c9472edcryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5e56b8cf14ec2d512d3cbf641670df90d
SHA1df1d5190f437e976321640a3d93c5161b4e071d0
SHA256da57bf6dd53c3c1b9043e919c525219b6446cb50aaa37a46eafd2b97b7b6b8ad
SHA51216291954a2012a2e2fa198be031837a1e6be144e553bb08530c08fb5672cf03dbb452ce73827d5a66074c147f83df74fc2b1d0ba0b86996693c985b51fbf1b87