Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:25
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-23_7408c7d1b4f110b3508c8e04b6833393_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-05-23_7408c7d1b4f110b3508c8e04b6833393_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-23_7408c7d1b4f110b3508c8e04b6833393_cryptolocker.exe
-
Size
44KB
-
MD5
7408c7d1b4f110b3508c8e04b6833393
-
SHA1
5b3db3bcb4aad16677c00e6a84dae1ee726ab76f
-
SHA256
fd3babd9c6af7daa821380ecf917428eaf496a40d0676d37c55cefc83a78c38c
-
SHA512
5976d329397f406deb014220c99c6b9596e0f56a5b40f0db43e1d91a084ce3d8fd54aa1020a7ab2dbf71911d4fb2b796a7c6333d5208adfde8fde459ca569eea
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBVaD3TP7DFHuRcD9H7Zc:X6QFElP6n+gJQMOtEvwDpjBmzDkWDt7e
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\asih.exe CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\asih.exe CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
Processes:
asih.exepid process 2884 asih.exe -
Loads dropped DLL 1 IoCs
Processes:
2024-05-23_7408c7d1b4f110b3508c8e04b6833393_cryptolocker.exepid process 1200 2024-05-23_7408c7d1b4f110b3508c8e04b6833393_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
2024-05-23_7408c7d1b4f110b3508c8e04b6833393_cryptolocker.exedescription pid process target process PID 1200 wrote to memory of 2884 1200 2024-05-23_7408c7d1b4f110b3508c8e04b6833393_cryptolocker.exe asih.exe PID 1200 wrote to memory of 2884 1200 2024-05-23_7408c7d1b4f110b3508c8e04b6833393_cryptolocker.exe asih.exe PID 1200 wrote to memory of 2884 1200 2024-05-23_7408c7d1b4f110b3508c8e04b6833393_cryptolocker.exe asih.exe PID 1200 wrote to memory of 2884 1200 2024-05-23_7408c7d1b4f110b3508c8e04b6833393_cryptolocker.exe asih.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_7408c7d1b4f110b3508c8e04b6833393_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-23_7408c7d1b4f110b3508c8e04b6833393_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5c73c0d3fffe2114de597abf2c6879fbb
SHA113a06ecde941e3a9e4549d2fe859f087ac239cdd
SHA256f0714389d2f64ae7ca9d1e988b7a6c1dbad012d6e9a2062452cca4ea275c6ad4
SHA512bdf7dfa47200615e6af5582c54c9ffa56daf464302b2ee4355490878a719b349c217f49b73074f3932d08a35fb5f0cbf6b999ab9666d14f08f093b00e9890c05