Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/01/2024, 03:22
Behavioral task
behavioral1
Sample
2024-01-28_039c9ce09be1e6d9582c043390d9d72c_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-28_039c9ce09be1e6d9582c043390d9d72c_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-28_039c9ce09be1e6d9582c043390d9d72c_cryptolocker.exe
-
Size
63KB
-
MD5
039c9ce09be1e6d9582c043390d9d72c
-
SHA1
eb62589cf5e0d34ea369b9750290201bfe1dc527
-
SHA256
0fee37b279855daaa210007397f140479150734b89ef7e274fffd682cfdc2264
-
SHA512
ab95598cb062ca34e7ae88cf50ab94128723f689ba53367da61db7c2712615acd820521c3c9e492f8ff77d321016f59a316aef3d7b5ba9e4ebcd1683a99248ec
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjY6U6:1nK6a+qdOOtEvwDpjD
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral1/memory/2976-0-0x0000000000500000-0x000000000050F311-memory.dmp CryptoLocker_rule2 behavioral1/files/0x0008000000012233-11.dat CryptoLocker_rule2 behavioral1/memory/2976-14-0x0000000000500000-0x000000000050F311-memory.dmp CryptoLocker_rule2 behavioral1/memory/2676-16-0x0000000000500000-0x000000000050F311-memory.dmp CryptoLocker_rule2 behavioral1/memory/2676-26-0x0000000000500000-0x000000000050F311-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 5 IoCs
resource yara_rule behavioral1/memory/2976-0-0x0000000000500000-0x000000000050F311-memory.dmp CryptoLocker_set1 behavioral1/files/0x0008000000012233-11.dat CryptoLocker_set1 behavioral1/memory/2976-14-0x0000000000500000-0x000000000050F311-memory.dmp CryptoLocker_set1 behavioral1/memory/2676-16-0x0000000000500000-0x000000000050F311-memory.dmp CryptoLocker_set1 behavioral1/memory/2676-26-0x0000000000500000-0x000000000050F311-memory.dmp CryptoLocker_set1 -
UPX dump on OEP (original entry point) 5 IoCs
resource yara_rule behavioral1/memory/2976-0-0x0000000000500000-0x000000000050F311-memory.dmp UPX behavioral1/files/0x0008000000012233-11.dat UPX behavioral1/memory/2976-14-0x0000000000500000-0x000000000050F311-memory.dmp UPX behavioral1/memory/2676-16-0x0000000000500000-0x000000000050F311-memory.dmp UPX behavioral1/memory/2676-26-0x0000000000500000-0x000000000050F311-memory.dmp UPX -
Executes dropped EXE 1 IoCs
pid Process 2676 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2976 2024-01-28_039c9ce09be1e6d9582c043390d9d72c_cryptolocker.exe -
resource yara_rule behavioral1/memory/2976-0-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral1/files/0x0008000000012233-11.dat upx behavioral1/memory/2976-14-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral1/memory/2676-16-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral1/memory/2676-26-0x0000000000500000-0x000000000050F311-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2976 wrote to memory of 2676 2976 2024-01-28_039c9ce09be1e6d9582c043390d9d72c_cryptolocker.exe 28 PID 2976 wrote to memory of 2676 2976 2024-01-28_039c9ce09be1e6d9582c043390d9d72c_cryptolocker.exe 28 PID 2976 wrote to memory of 2676 2976 2024-01-28_039c9ce09be1e6d9582c043390d9d72c_cryptolocker.exe 28 PID 2976 wrote to memory of 2676 2976 2024-01-28_039c9ce09be1e6d9582c043390d9d72c_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-28_039c9ce09be1e6d9582c043390d9d72c_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-28_039c9ce09be1e6d9582c043390d9d72c_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD5875333b1284db8cef954485e75f9ed84
SHA1243037f2a3d0812f020a273886b9a08fe217c436
SHA2561530322e2b83ababfb79ef9f046b7e5a7fc25c5992eccec6269d2efa4f2196a8
SHA5124bb9a684a4505bfdf21e7829c672add00bf258f293fe5cab8d68be5a78c8205f28f9ea8d3f0feb8ca798376c96355f1d6ffdc57408ecc25f1c334eb7028e509d