Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 19:32
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-29_c5278d5c9c6cdcead4228036a2440417_cryptolocker.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-05-29_c5278d5c9c6cdcead4228036a2440417_cryptolocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-29_c5278d5c9c6cdcead4228036a2440417_cryptolocker.exe
-
Size
39KB
-
MD5
c5278d5c9c6cdcead4228036a2440417
-
SHA1
de354ea0b95a47c97835602f8a06ade891714f35
-
SHA256
b81219f79045531ab623cd9b2095182f5e2eebc953bb0a05cb38dfb42dfa5cdd
-
SHA512
109c9822e064e072eb3cb56f3ee04623fc705fec770720526d01852b6d73bc14fccf5e786c525b139afdbb141f0aaf2a53e8bca8d07a22c417fd6e46c558c6f9
-
SSDEEP
768:b7o/2n1TCraU6GD1a4Xt9bRU6zA6o36m+7I:bc/y2lLRU6zA6qP
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x0007000000012120-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2592 rewok.exe -
Loads dropped DLL 1 IoCs
pid Process 2936 2024-05-29_c5278d5c9c6cdcead4228036a2440417_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2936 2024-05-29_c5278d5c9c6cdcead4228036a2440417_cryptolocker.exe 2592 rewok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2592 2936 2024-05-29_c5278d5c9c6cdcead4228036a2440417_cryptolocker.exe 28 PID 2936 wrote to memory of 2592 2936 2024-05-29_c5278d5c9c6cdcead4228036a2440417_cryptolocker.exe 28 PID 2936 wrote to memory of 2592 2936 2024-05-29_c5278d5c9c6cdcead4228036a2440417_cryptolocker.exe 28 PID 2936 wrote to memory of 2592 2936 2024-05-29_c5278d5c9c6cdcead4228036a2440417_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-29_c5278d5c9c6cdcead4228036a2440417_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-29_c5278d5c9c6cdcead4228036a2440417_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\rewok.exe"C:\Users\Admin\AppData\Local\Temp\rewok.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD55a9ebe5b4e743c6bfb3e36b6a1a40651
SHA1275446aec46690c8ef7722f016306edd1fe8eb1d
SHA256fea83699c8bf2c949d783e150eb2e1cb34503c829fe75cc5296b0d3ffefdda1d
SHA512bdf3a03f9aa2a2b3bd915a85d7993e084599a9d922880085907c096f694efac05e3b1cd53cb986c7376d3b66052ed637ff6a8f9216d2d2ecc2a4754d4f012bd0