Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 06:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-23_0857a43be9a5a77035b72d38cde3485a_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-23_0857a43be9a5a77035b72d38cde3485a_cryptolocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-23_0857a43be9a5a77035b72d38cde3485a_cryptolocker.exe
-
Size
38KB
-
MD5
0857a43be9a5a77035b72d38cde3485a
-
SHA1
1e74ffd9861a8650c3ca7ebb489f65391d94c868
-
SHA256
f1ce3c72a279883cc21c2ac7d70d45a7cf5ff5eac59d7456282c276c3c61293f
-
SHA512
7042c12c160b3d8e55d97bc8d3b62c9fff1c75d8ffea4568186362a7a136e49f2384643b8c187d334191b31ee526bd4cab212a8fafb0e66af448f1c2a19875f1
-
SSDEEP
384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSzn1KkZCb9q8INBjPP8ui:b/yC4GyNM01GuQMNXw2PSj1Pqq8oBjU
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\retln.exe CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
Processes:
retln.exepid process 2024 retln.exe -
Loads dropped DLL 1 IoCs
Processes:
2024-05-23_0857a43be9a5a77035b72d38cde3485a_cryptolocker.exepid process 2984 2024-05-23_0857a43be9a5a77035b72d38cde3485a_cryptolocker.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
Processes:
2024-05-23_0857a43be9a5a77035b72d38cde3485a_cryptolocker.exeretln.exepid process 2984 2024-05-23_0857a43be9a5a77035b72d38cde3485a_cryptolocker.exe 2024 retln.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
2024-05-23_0857a43be9a5a77035b72d38cde3485a_cryptolocker.exedescription pid process target process PID 2984 wrote to memory of 2024 2984 2024-05-23_0857a43be9a5a77035b72d38cde3485a_cryptolocker.exe retln.exe PID 2984 wrote to memory of 2024 2984 2024-05-23_0857a43be9a5a77035b72d38cde3485a_cryptolocker.exe retln.exe PID 2984 wrote to memory of 2024 2984 2024-05-23_0857a43be9a5a77035b72d38cde3485a_cryptolocker.exe retln.exe PID 2984 wrote to memory of 2024 2984 2024-05-23_0857a43be9a5a77035b72d38cde3485a_cryptolocker.exe retln.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_0857a43be9a5a77035b72d38cde3485a_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-23_0857a43be9a5a77035b72d38cde3485a_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\retln.exe"C:\Users\Admin\AppData\Local\Temp\retln.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD578049fde32276da07190cbd982da7373
SHA16b181f40affa8dd2a09811ea879c75a341b93ef8
SHA256b62b8b016322ba746c3d6319c95bc94181b1d256c6b95d94795faa8e7a65c24e
SHA51213006c70e8508c1f99e3573912c140b74b8039b810106eb61084ba9f2862281875cd76c3253d04774b9a36ee290ade0c5d58f231c52f3e3cffd5c4ce958b222c