Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 10:54
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-25_de0689614f54ac3a9b7d6d84f4a1445f_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-05-25_de0689614f54ac3a9b7d6d84f4a1445f_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-05-25_de0689614f54ac3a9b7d6d84f4a1445f_cryptolocker.exe
-
Size
76KB
-
MD5
de0689614f54ac3a9b7d6d84f4a1445f
-
SHA1
2bdf803cb0de9304c2660ec441f2773042ba272b
-
SHA256
0511ecae6f47560c9ed8233d94f06aafd67146aa1d58b0a2c39835b6f96e2f7e
-
SHA512
a0a7d5de98dedd5258fcf6a21f6984b6070ecb06f1b8c665a5b2366f5b9271a0cf46fa2870575526e7c581cb2d287e62cbe4892c46f8bbb8c84187b4060fd92f
-
SSDEEP
1536:X6QFElP6n+gJQMOtEvwDpjBZYTjipvF2bx1siMOJB:X6a+SOtEvwDpjBZYvQd2R
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000c000000015cb1-13.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000c000000015cb1-13.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2712 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2768 2024-05-25_de0689614f54ac3a9b7d6d84f4a1445f_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2768 wrote to memory of 2712 2768 2024-05-25_de0689614f54ac3a9b7d6d84f4a1445f_cryptolocker.exe 28 PID 2768 wrote to memory of 2712 2768 2024-05-25_de0689614f54ac3a9b7d6d84f4a1445f_cryptolocker.exe 28 PID 2768 wrote to memory of 2712 2768 2024-05-25_de0689614f54ac3a9b7d6d84f4a1445f_cryptolocker.exe 28 PID 2768 wrote to memory of 2712 2768 2024-05-25_de0689614f54ac3a9b7d6d84f4a1445f_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_de0689614f54ac3a9b7d6d84f4a1445f_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-25_de0689614f54ac3a9b7d6d84f4a1445f_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD597a0a5f378ad4a9a79968ca5a3c1450c
SHA1d6d54975bf7c3e6c2fbcaf3b6c07fa6a90a80f2e
SHA2567249f47e181df42eb055c92e3eaee4083604a827b5802105b24c3605e8e05ff1
SHA5123c69fa193e1a45a5270aa32d334c03a3a134662041e8377933b268e2047e5902adec2daadd107d832bb05bb2e1b49b3b5a4f1549b2cd03bd0fddd6843abeacb3