Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
14-06-2024 07:39
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-14_5309d884e725a7aa77aea5a1b79de9a2_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-06-14_5309d884e725a7aa77aea5a1b79de9a2_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-14_5309d884e725a7aa77aea5a1b79de9a2_cryptolocker.exe
-
Size
52KB
-
MD5
5309d884e725a7aa77aea5a1b79de9a2
-
SHA1
20319bd676a69b6bd908fc044870582ea5a48707
-
SHA256
4340188cb162ea9b961e8e1270cc0974f94d46c3c1a2305fb8a4d5b93b9925b3
-
SHA512
3e0a7e76c9ed15d46f10f00e84c987c5ffcb9cca3073a70a2a02dbcba03d3103a3aca0a6faf6b06a90f71aee18c80fe05f22ed6b31845d0d68604133f8e32145
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/BtOOtEvwDpjBVaD3E09vxmlcaf2f:X6QFElP6n+gJBMOtEvwDpjBtExmln2f
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000b00000001472f-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000b00000001472f-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2580 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2184 2024-06-14_5309d884e725a7aa77aea5a1b79de9a2_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2580 2184 2024-06-14_5309d884e725a7aa77aea5a1b79de9a2_cryptolocker.exe 28 PID 2184 wrote to memory of 2580 2184 2024-06-14_5309d884e725a7aa77aea5a1b79de9a2_cryptolocker.exe 28 PID 2184 wrote to memory of 2580 2184 2024-06-14_5309d884e725a7aa77aea5a1b79de9a2_cryptolocker.exe 28 PID 2184 wrote to memory of 2580 2184 2024-06-14_5309d884e725a7aa77aea5a1b79de9a2_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_5309d884e725a7aa77aea5a1b79de9a2_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-14_5309d884e725a7aa77aea5a1b79de9a2_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD589782b6849a7da24ccade972d88e99f2
SHA1f140c4d0f2ff0eb44c686ee3477a6a2c32c46bdf
SHA256b66898ef969a69a084096ea7c5ca7e1701374aef1abf40e5e5841a7146349670
SHA5120f5f1b2706e9c14af8641ffdf3cbbc8faa0f557f85075b9b233f396aea223a2a5301238a7f316d2effbbacd033e498061d5184fd37cf8d4f8b73c3ca0a8bfeef