Analysis
-
max time kernel
133s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 00:23
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-09_0a294bd03becd2e0b798fadd2b08bd0d_cryptolocker.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-07-09_0a294bd03becd2e0b798fadd2b08bd0d_cryptolocker.exe
Resource
win10v2004-20240704-en
General
-
Target
2024-07-09_0a294bd03becd2e0b798fadd2b08bd0d_cryptolocker.exe
-
Size
72KB
-
MD5
0a294bd03becd2e0b798fadd2b08bd0d
-
SHA1
6def42449905e3c476abfaa0f08e6e69ddbd91f7
-
SHA256
6aa380f9dedc41d7bb490e4625db1fbbfb5df5e7ea113c316e2c6f882d688d61
-
SHA512
9cfd2ff40f71767b0810274e9ce2235ccade71c16005fe9876d3c2010d758daacdb9652b290b1db955a9de49133f4dbec73e5f8f3b5abbce5cd0f6578d43d295
-
SSDEEP
1536:Dk/xY0sllyGQMOtEvwDpjwycDtKkQZQRKb61vSbgZ3QzNKUNZOr:DW60sllyWOtEvwDpjwF85k
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 348 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2984 2024-07-09_0a294bd03becd2e0b798fadd2b08bd0d_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2984 wrote to memory of 348 2984 2024-07-09_0a294bd03becd2e0b798fadd2b08bd0d_cryptolocker.exe 30 PID 2984 wrote to memory of 348 2984 2024-07-09_0a294bd03becd2e0b798fadd2b08bd0d_cryptolocker.exe 30 PID 2984 wrote to memory of 348 2984 2024-07-09_0a294bd03becd2e0b798fadd2b08bd0d_cryptolocker.exe 30 PID 2984 wrote to memory of 348 2984 2024-07-09_0a294bd03becd2e0b798fadd2b08bd0d_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-09_0a294bd03becd2e0b798fadd2b08bd0d_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-09_0a294bd03becd2e0b798fadd2b08bd0d_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5542f0779feae5499e01a98e1fd8a746a
SHA177db8284f70b73e9d8bdd14f9cc7660a5386659c
SHA2565be9d29e5444a7f8eef388c006120125f4f7ec4d4c33726b0cb96754d55b945a
SHA512b533e92c496f5606fa6cd85d606458a2f4ff7995053cd53eb8665b0aed0b5be011f2c4fb261a197fe31c16f835714317d98d88e1e26a0613553dc80ee0f1bc68