Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 14:51
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-22_7d378984d8e379a7ca65462d5afb40dc_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-05-22_7d378984d8e379a7ca65462d5afb40dc_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-22_7d378984d8e379a7ca65462d5afb40dc_cryptolocker.exe
-
Size
46KB
-
MD5
7d378984d8e379a7ca65462d5afb40dc
-
SHA1
efc0a4521e10e1384ad240ac0713adf721db708c
-
SHA256
eb6f9130e4951a9ff1daa8dceab4a026ed3613317a780748839de5c663d61113
-
SHA512
8feda65929b7d6258face324d80b3577be253a852ba22c9945af1857e9901e460cd221a6e6646cb059017f58f662191ce85fd07626907c1af47e417302e58ae5
-
SSDEEP
768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpj/MLam5aFr7YOzzfm0EXsJv:V6QFElP6n+gMQMOtEvwDpjyaYaFAh3m
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000b000000015c3d-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000b000000015c3d-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2820 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 624 2024-05-22_7d378984d8e379a7ca65462d5afb40dc_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 624 wrote to memory of 2820 624 2024-05-22_7d378984d8e379a7ca65462d5afb40dc_cryptolocker.exe 28 PID 624 wrote to memory of 2820 624 2024-05-22_7d378984d8e379a7ca65462d5afb40dc_cryptolocker.exe 28 PID 624 wrote to memory of 2820 624 2024-05-22_7d378984d8e379a7ca65462d5afb40dc_cryptolocker.exe 28 PID 624 wrote to memory of 2820 624 2024-05-22_7d378984d8e379a7ca65462d5afb40dc_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_7d378984d8e379a7ca65462d5afb40dc_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-22_7d378984d8e379a7ca65462d5afb40dc_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD5b31c74cbfcd2b0ef8735893a7b835546
SHA11468486f7a1411a340bb33d368062a5c05617fda
SHA256000acd3003419aa71f9781623baa17b5e28a5fbff2d98de1c6b1243c96ad080c
SHA51203efb34a111ad87d81f695c172398e7cd7d75fa5072132432fbad4d7fcfd327a382e2438a922acfe8e8592f49e0a275a37128c90993bc2cdb323c822e0b9641b