Analysis
-
max time kernel
14s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 03:23
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-26_0abfcb46500bd375132077a7cc7ac9d6_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-26_0abfcb46500bd375132077a7cc7ac9d6_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-26_0abfcb46500bd375132077a7cc7ac9d6_cryptolocker.exe
-
Size
43KB
-
MD5
0abfcb46500bd375132077a7cc7ac9d6
-
SHA1
918d04121ce83b406a99c92c623c255cd1e6a01f
-
SHA256
972697dbd6836d5c3d412151b44effac672fefaff4cb2cce412e19ba257e72d0
-
SHA512
956ba6dcbeff50fdd59155904e06bfd7b58ee2e7fb511ed3242b66a33ad083a7e7b6fb8c0ffb74a67450c30b7cce699f61a0529b065f6c248ad5c8f2d08c1837
-
SSDEEP
768:b/yC4GyNM01GuQMNXw2PSjHPbSuYlW8PAx:b/pYayGig5HjS3NPAx
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x001000000001226b-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2016 retln.exe -
Loads dropped DLL 1 IoCs
pid Process 2204 2024-05-26_0abfcb46500bd375132077a7cc7ac9d6_cryptolocker.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2204 2024-05-26_0abfcb46500bd375132077a7cc7ac9d6_cryptolocker.exe 2016 retln.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2016 2204 2024-05-26_0abfcb46500bd375132077a7cc7ac9d6_cryptolocker.exe 28 PID 2204 wrote to memory of 2016 2204 2024-05-26_0abfcb46500bd375132077a7cc7ac9d6_cryptolocker.exe 28 PID 2204 wrote to memory of 2016 2204 2024-05-26_0abfcb46500bd375132077a7cc7ac9d6_cryptolocker.exe 28 PID 2204 wrote to memory of 2016 2204 2024-05-26_0abfcb46500bd375132077a7cc7ac9d6_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_0abfcb46500bd375132077a7cc7ac9d6_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-26_0abfcb46500bd375132077a7cc7ac9d6_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\retln.exe"C:\Users\Admin\AppData\Local\Temp\retln.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD57c435fbe6d625e5b26649a7ca5116246
SHA12380b3c1132104899a479205bf508cb9bf19ad8e
SHA256450ff84c9b2dd265eee4413b2f2b2bd9dbd244e0a6ea4390798bdd626d50cd69
SHA51260a4688f30c921f95856f4538db34df456447043373ebd1a925abe631a14e8b9582bba6247cc60ff182c5eb70cd330052cbc1f2b9a732391ab69567bbbb89fc6