Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 19:41
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-23_d9c3764ed2fbcc9035364392cb8274df_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-23_d9c3764ed2fbcc9035364392cb8274df_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-23_d9c3764ed2fbcc9035364392cb8274df_cryptolocker.exe
-
Size
73KB
-
MD5
d9c3764ed2fbcc9035364392cb8274df
-
SHA1
226f13668115eb57f8eaafdb3d65171515668b46
-
SHA256
1eecb5fab3eeef3a9b2504d4db9dbc9783dd5abe353596d942a1b8fc57a08865
-
SHA512
26c6b716c59fc1c2d79302d32fb28e752bec3f629511a09deb148cfa99473675587a2cb02558fa074fa43f2ff7327689a3baf4ff0b3b0abc80e6b69aa4759dfe
-
SSDEEP
768:u6LsoEEeegiZPvEhHSG+gZgtOOtEvwDpjeY10Y/YMs8:u6QFElP6n+gWMOtEvwDpjJGYQb8
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000f00000001227e-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000f00000001227e-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 3044 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2116 2024-05-23_d9c3764ed2fbcc9035364392cb8274df_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2116 wrote to memory of 3044 2116 2024-05-23_d9c3764ed2fbcc9035364392cb8274df_cryptolocker.exe 28 PID 2116 wrote to memory of 3044 2116 2024-05-23_d9c3764ed2fbcc9035364392cb8274df_cryptolocker.exe 28 PID 2116 wrote to memory of 3044 2116 2024-05-23_d9c3764ed2fbcc9035364392cb8274df_cryptolocker.exe 28 PID 2116 wrote to memory of 3044 2116 2024-05-23_d9c3764ed2fbcc9035364392cb8274df_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_d9c3764ed2fbcc9035364392cb8274df_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-23_d9c3764ed2fbcc9035364392cb8274df_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD5fe92ff6bc1fa92a62449fb11bbdb7368
SHA1120ff8c8573dcf839bf0100fbc2f181e2a4efacb
SHA256312ffc9e05870fe8b99561106522053449d7513441f36c1d71ec938d8eb30a9a
SHA5120c86555f221f174913a0ee3776c4c0c28fce2c79492cffacb44b9dd620fa15fbf7c2877e76841c04129c8a28cc4489eb5c5dc56c034980e8f0c6e9083dfa159c