Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
24-06-2024 21:27
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-24_842b59eaf3928630291a1da380b4269c_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-06-24_842b59eaf3928630291a1da380b4269c_cryptolocker.exe
Resource
win10v2004-20240611-en
General
-
Target
2024-06-24_842b59eaf3928630291a1da380b4269c_cryptolocker.exe
-
Size
47KB
-
MD5
842b59eaf3928630291a1da380b4269c
-
SHA1
ffe839b6595de203c599049645d7588012483745
-
SHA256
8ddf8f5e153639697164ddea0a97841d66b4eb8f15a8e36fe65e4e4c1c9d4feb
-
SHA512
a6f556c78f7feb8ce1619f31dca8af398c452a63e67abf814af2f8dca6ae27b824cd48323ada2cf766fc2e92b29ce4a77766b3d7d7c02aa860e4ddc757ae790e
-
SSDEEP
768:P6LsoEEeegiZPvEhHS5+Mh/QtOOtEvwDpjBpaD3TUogs/VXpAPlAt:P6QFElP6k+MRQMOtEvwDpjBQpVX8At
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2712 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2768 2024-06-24_842b59eaf3928630291a1da380b4269c_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2768 wrote to memory of 2712 2768 2024-06-24_842b59eaf3928630291a1da380b4269c_cryptolocker.exe 28 PID 2768 wrote to memory of 2712 2768 2024-06-24_842b59eaf3928630291a1da380b4269c_cryptolocker.exe 28 PID 2768 wrote to memory of 2712 2768 2024-06-24_842b59eaf3928630291a1da380b4269c_cryptolocker.exe 28 PID 2768 wrote to memory of 2712 2768 2024-06-24_842b59eaf3928630291a1da380b4269c_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-24_842b59eaf3928630291a1da380b4269c_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-24_842b59eaf3928630291a1da380b4269c_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD55c51d9f9137f4707bacf7a4fa3dc0423
SHA18b9ad5a5606f250efeb2b45d0219a57ceaa4c8b1
SHA2561d0de77dd9e4dfbe2c9b9e2d034195c7c7f71ae4965c8598563dada5a445040a
SHA5129c76d3839cfdebe039c11db5e4eefd2c0b7999b1829476ea320a6ceb13f6a0215de37b99cd5548c986cdde6374f8b30e10d739f035b861db031fca60dcd0f3d5