Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 09:59
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-29_fca104331846ed43d4a8b36173358264_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-05-29_fca104331846ed43d4a8b36173358264_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-29_fca104331846ed43d4a8b36173358264_cryptolocker.exe
-
Size
38KB
-
MD5
fca104331846ed43d4a8b36173358264
-
SHA1
18a2b95b85cf8c57da95006e4b2b1bcb428a5413
-
SHA256
9b50def5a4ffe4a8b1de0b1e6f548b5fcfcff6f80940c7fe7aa32950927b862d
-
SHA512
affe9f89352698ee87b0a9988674be0debf9c21c0daec317b0fe5c604a366a76416b2f18825354146ecf313e325b48dac032bb639167218ecf2bd90144249d0a
-
SSDEEP
384:bmM0V/YPvnr801TRoUGPh4TKt6ATt1DqgPa3s/zzoCt9/B1RU3V6uVjhbuU/H:b7o/2n1TCraU6GD1a4Xt9bRUlV5hbb/H
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000c0000000155f6-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2052 rewok.exe -
Loads dropped DLL 1 IoCs
pid Process 2304 2024-05-29_fca104331846ed43d4a8b36173358264_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2304 2024-05-29_fca104331846ed43d4a8b36173358264_cryptolocker.exe 2052 rewok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2052 2304 2024-05-29_fca104331846ed43d4a8b36173358264_cryptolocker.exe 28 PID 2304 wrote to memory of 2052 2304 2024-05-29_fca104331846ed43d4a8b36173358264_cryptolocker.exe 28 PID 2304 wrote to memory of 2052 2304 2024-05-29_fca104331846ed43d4a8b36173358264_cryptolocker.exe 28 PID 2304 wrote to memory of 2052 2304 2024-05-29_fca104331846ed43d4a8b36173358264_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-29_fca104331846ed43d4a8b36173358264_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-29_fca104331846ed43d4a8b36173358264_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\rewok.exe"C:\Users\Admin\AppData\Local\Temp\rewok.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD5fa054d435c8c25a61676a56760e49606
SHA185aa0949d4c15c4d525bb21965a72b81c524fc86
SHA2563049e7dcfe55d26085a67d79cf947e5a436a929a2ea21d18c6afefd456234f47
SHA512712d9e9a36b23188b98a17ac4d8da774aa0ed9aea860a009bdede94dc954d589b71bbe19707f91b46ce5870ccb797438c626c01ebdf00ec0cb6bb810242b2908