Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
16-06-2024 18:25
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-16_1ed5256e259464cff746ecbb0edc6140_cryptolocker.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2024-06-16_1ed5256e259464cff746ecbb0edc6140_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-16_1ed5256e259464cff746ecbb0edc6140_cryptolocker.exe
-
Size
71KB
-
MD5
1ed5256e259464cff746ecbb0edc6140
-
SHA1
b6f7817dba8d2cfb2717420528cc6f9c9492eec1
-
SHA256
eea50c285ede134329dcf7cb319b9e57974415ce0091931e3d641e85204afb95
-
SHA512
5e08a7e5ed1572c9dc14b1c5c1b0211da4ed1510ad71b97a0b72e5bf0260deec82b2d8851882e9d2de9dc3bab3456724380ba370ce62182a5cf14bc51056b239
-
SSDEEP
1536:Dk/xY0sllyGQMOtEvwDpjwycDtKkQZQRKb61vSbgZ3QzNKUNZOq:DW60sllyWOtEvwDpjwF85B
Malware Config
Signatures
-
Detection of CryptoLocker Variants 4 IoCs
resource yara_rule behavioral1/memory/2028-0-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x00090000000122d6-11.dat CryptoLocker_rule2 behavioral1/memory/2028-15-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2956-16-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 4 IoCs
resource yara_rule behavioral1/memory/2028-0-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_set1 behavioral1/files/0x00090000000122d6-11.dat CryptoLocker_set1 behavioral1/memory/2028-15-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_set1 behavioral1/memory/2956-16-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2956 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2028 2024-06-16_1ed5256e259464cff746ecbb0edc6140_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2956 2028 2024-06-16_1ed5256e259464cff746ecbb0edc6140_cryptolocker.exe 28 PID 2028 wrote to memory of 2956 2028 2024-06-16_1ed5256e259464cff746ecbb0edc6140_cryptolocker.exe 28 PID 2028 wrote to memory of 2956 2028 2024-06-16_1ed5256e259464cff746ecbb0edc6140_cryptolocker.exe 28 PID 2028 wrote to memory of 2956 2028 2024-06-16_1ed5256e259464cff746ecbb0edc6140_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-16_1ed5256e259464cff746ecbb0edc6140_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-16_1ed5256e259464cff746ecbb0edc6140_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5e7ef9baac3b79a7a2f46d0589d972674
SHA1f37be5502050f9c392ac439d52bd0f65c21bd467
SHA25664539cfd8a83f40908d5c73d6a52404252b6a266c672859bce0f9feb4e4743e1
SHA5121f667d58461ea91ef61282f1850148916206bef24492c248f1fe7ee5f52ef64d5f9c5354c7c494df3976e37801d20cc1c0c1e0a105ad2f384fa69aa8a67c0052