Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 21:19
Behavioral task
behavioral1
Sample
202405245e1cfce2d2ce7724315dc6b3c584dc06cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
202405245e1cfce2d2ce7724315dc6b3c584dc06cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
202405245e1cfce2d2ce7724315dc6b3c584dc06cryptolocker.exe
-
Size
91KB
-
MD5
5e1cfce2d2ce7724315dc6b3c584dc06
-
SHA1
c32bbc8cf357f4cb04ad8d5ec7a8f67915459d34
-
SHA256
b21d8eb00418fe3c6b3d46b12dc2b6e04f2d4c74ea03e73da116dab8dca3cda1
-
SHA512
5675076a1f1a3f8b8bf39e9855cf0ea89da90f513b25710a4dae6e3ef9eb5ff5893c4bf8204dabde8623900b0ad0fbc7e88e250d5e02ca9c23b244f94e4d7afb
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgddjF:AnBdOOtEvwDpj6zd
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1680 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2168 202405245e1cfce2d2ce7724315dc6b3c584dc06cryptolocker.exe -
resource yara_rule behavioral1/memory/2168-0-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/files/0x000b000000015a2d-11.dat upx behavioral1/memory/2168-15-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/memory/1680-17-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/memory/1680-27-0x0000000000500000-0x000000000050F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 1680 2168 202405245e1cfce2d2ce7724315dc6b3c584dc06cryptolocker.exe 28 PID 2168 wrote to memory of 1680 2168 202405245e1cfce2d2ce7724315dc6b3c584dc06cryptolocker.exe 28 PID 2168 wrote to memory of 1680 2168 202405245e1cfce2d2ce7724315dc6b3c584dc06cryptolocker.exe 28 PID 2168 wrote to memory of 1680 2168 202405245e1cfce2d2ce7724315dc6b3c584dc06cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\202405245e1cfce2d2ce7724315dc6b3c584dc06cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\202405245e1cfce2d2ce7724315dc6b3c584dc06cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:1680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD5183d8e0e567c7119b1a10df81a954ceb
SHA108eafb7ead13445a5ca298005209748b995f97ee
SHA2567e4ce007a6b174376b47141e2a278b22ea7248b4183768c48f2a0b372776bcc1
SHA5126fc2358b72436f49457cdf44ccfb48c85780e655414fffbb11f599c966ec51193efb7e137a1778950520aa4f9eccd70201ee5732fcd45b39a16cdbcb1b87021e