Analysis
-
max time kernel
14s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 01:09
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-01_83a3037908d11d4d0cb4fea23fda37dd_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-01_83a3037908d11d4d0cb4fea23fda37dd_cryptolocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-06-01_83a3037908d11d4d0cb4fea23fda37dd_cryptolocker.exe
-
Size
42KB
-
MD5
83a3037908d11d4d0cb4fea23fda37dd
-
SHA1
6a908b8b4e51111ad871542c804e2bd8a28dffe6
-
SHA256
226c45692bd5fe7b66316716992b18f434e8e03c2d46647440d364fc1d616eff
-
SHA512
c89e08d2d6f28b42fee434b2e791f517fc118bbba9d3d8f3334e72b0f2dc4a0ee7b157be76cff8c3a03cff4353ce82214351a9c8548ce9cfcbc664dc9acc73a8
-
SSDEEP
768:b/yC4GyNM01GuQMNXw2PSjHPbSuYlW8PAY:b/pYayGig5HjS3NPAY
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000f000000012028-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2592 retln.exe -
Loads dropped DLL 1 IoCs
pid Process 492 2024-06-01_83a3037908d11d4d0cb4fea23fda37dd_cryptolocker.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 492 2024-06-01_83a3037908d11d4d0cb4fea23fda37dd_cryptolocker.exe 2592 retln.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 492 wrote to memory of 2592 492 2024-06-01_83a3037908d11d4d0cb4fea23fda37dd_cryptolocker.exe 29 PID 492 wrote to memory of 2592 492 2024-06-01_83a3037908d11d4d0cb4fea23fda37dd_cryptolocker.exe 29 PID 492 wrote to memory of 2592 492 2024-06-01_83a3037908d11d4d0cb4fea23fda37dd_cryptolocker.exe 29 PID 492 wrote to memory of 2592 492 2024-06-01_83a3037908d11d4d0cb4fea23fda37dd_cryptolocker.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-01_83a3037908d11d4d0cb4fea23fda37dd_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-01_83a3037908d11d4d0cb4fea23fda37dd_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:492 -
C:\Users\Admin\AppData\Local\Temp\retln.exe"C:\Users\Admin\AppData\Local\Temp\retln.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD59ccc661d72d4d329cf525711bab87377
SHA14c09a4b3cdd387906354b468e5957dec02b2041c
SHA256c95487c72a957f796863a3ad082f13e831b4f55e5f2b3a9eacc541f1a43aabee
SHA512b7009c87fb470c2f156027fadb90b40e3300c9737797b350952ab3c1fa98be5d229a86a99e341c8c605ac6f9b743b18a52f08bdcef3d97743beb3df1ab46a94d