Analysis
-
max time kernel
0s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/06/2024, 23:25
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-06_44f70acf5192f4184e1e958a4d6f79a0_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-06_44f70acf5192f4184e1e958a4d6f79a0_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-06_44f70acf5192f4184e1e958a4d6f79a0_cryptolocker.exe
-
Size
39KB
-
MD5
44f70acf5192f4184e1e958a4d6f79a0
-
SHA1
d16cd86e9087c07b4264182d91bfbbfe8a5f5d94
-
SHA256
5d3afdc066382c7f03a9a3218985ac6db4d5fce9acb50440f1409e004552e485
-
SHA512
ce923aa2c36b8a7f9673d90528142f93cd23a3cadc296c4b3df09a9991c3ef215b2cde3b4b307c810b0181eed129acd3f2b5e466ea135c1fce1c004bd2c48c56
-
SSDEEP
768:b7o/2n1TCraU6GD1a4Xt9bRU6zA6o36mr:bc/y2lLRU6zA6qr
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000b000000014230-22.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2380 rewok.exe -
Loads dropped DLL 1 IoCs
pid Process 2676 2024-06-06_44f70acf5192f4184e1e958a4d6f79a0_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2676 2024-06-06_44f70acf5192f4184e1e958a4d6f79a0_cryptolocker.exe 2380 rewok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2676 wrote to memory of 2380 2676 2024-06-06_44f70acf5192f4184e1e958a4d6f79a0_cryptolocker.exe 28 PID 2676 wrote to memory of 2380 2676 2024-06-06_44f70acf5192f4184e1e958a4d6f79a0_cryptolocker.exe 28 PID 2676 wrote to memory of 2380 2676 2024-06-06_44f70acf5192f4184e1e958a4d6f79a0_cryptolocker.exe 28 PID 2676 wrote to memory of 2380 2676 2024-06-06_44f70acf5192f4184e1e958a4d6f79a0_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-06_44f70acf5192f4184e1e958a4d6f79a0_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-06_44f70acf5192f4184e1e958a4d6f79a0_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\rewok.exe"C:\Users\Admin\AppData\Local\Temp\rewok.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD5d020adf55016dc24d840746895bb76c5
SHA17a113a115e39bad7461de05e06079ace743227b0
SHA256fbfcce28ddfbf6e011588711f5dbfec4203ca3154654de8eac6572397dbff1db
SHA512f040ffaf7292b991fa3122ea47255da73073c7aa68271e034cfef941f0351e6d9eb37a01efc6c57a09023535c1b80fd34eb4ec3b6553de08b775de607095e5aa