Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
04/02/2024, 12:44
Behavioral task
behavioral1
Sample
2024-02-04_d02d30766154d1cc31def1fd68804f6f_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-02-04_d02d30766154d1cc31def1fd68804f6f_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-04_d02d30766154d1cc31def1fd68804f6f_cryptolocker.exe
-
Size
62KB
-
MD5
d02d30766154d1cc31def1fd68804f6f
-
SHA1
5ef4a42b0f49cea9bb313e65a53c49a032bb94c9
-
SHA256
27687748acd81f04168d6de292272c3764ecdf0bbfd08b67013566f30966beb4
-
SHA512
ef8cc21415ce8c0a06575b4f608fa059b916bd1a4ad2276da12e9ea490b3d6b71e1238ccf68a5c599480104865076ec7c0c482e5191af1b25fbc54b3507635cc
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAo/:1nK6a+qdOOtEvwDpjB
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral1/memory/3040-0-0x0000000000500000-0x000000000050F311-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000a0000000133a9-11.dat CryptoLocker_rule2 behavioral1/memory/3040-15-0x0000000000500000-0x000000000050F311-memory.dmp CryptoLocker_rule2 behavioral1/memory/2944-17-0x0000000000500000-0x000000000050F311-memory.dmp CryptoLocker_rule2 behavioral1/memory/2944-27-0x0000000000500000-0x000000000050F311-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 5 IoCs
resource yara_rule behavioral1/memory/3040-0-0x0000000000500000-0x000000000050F311-memory.dmp CryptoLocker_set1 behavioral1/files/0x000a0000000133a9-11.dat CryptoLocker_set1 behavioral1/memory/3040-15-0x0000000000500000-0x000000000050F311-memory.dmp CryptoLocker_set1 behavioral1/memory/2944-17-0x0000000000500000-0x000000000050F311-memory.dmp CryptoLocker_set1 behavioral1/memory/2944-27-0x0000000000500000-0x000000000050F311-memory.dmp CryptoLocker_set1 -
UPX dump on OEP (original entry point) 5 IoCs
resource yara_rule behavioral1/memory/3040-0-0x0000000000500000-0x000000000050F311-memory.dmp UPX behavioral1/files/0x000a0000000133a9-11.dat UPX behavioral1/memory/3040-15-0x0000000000500000-0x000000000050F311-memory.dmp UPX behavioral1/memory/2944-17-0x0000000000500000-0x000000000050F311-memory.dmp UPX behavioral1/memory/2944-27-0x0000000000500000-0x000000000050F311-memory.dmp UPX -
Executes dropped EXE 1 IoCs
pid Process 2944 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 3040 2024-02-04_d02d30766154d1cc31def1fd68804f6f_cryptolocker.exe -
resource yara_rule behavioral1/memory/3040-0-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral1/files/0x000a0000000133a9-11.dat upx behavioral1/memory/3040-15-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral1/memory/2944-17-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral1/memory/2944-27-0x0000000000500000-0x000000000050F311-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2944 3040 2024-02-04_d02d30766154d1cc31def1fd68804f6f_cryptolocker.exe 28 PID 3040 wrote to memory of 2944 3040 2024-02-04_d02d30766154d1cc31def1fd68804f6f_cryptolocker.exe 28 PID 3040 wrote to memory of 2944 3040 2024-02-04_d02d30766154d1cc31def1fd68804f6f_cryptolocker.exe 28 PID 3040 wrote to memory of 2944 3040 2024-02-04_d02d30766154d1cc31def1fd68804f6f_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-04_d02d30766154d1cc31def1fd68804f6f_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-04_d02d30766154d1cc31def1fd68804f6f_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD5693c48777620da6b3028ede123b43141
SHA1ea389395943e06c12d16dbd69b640720675ca621
SHA256964b08cab9ff0550796bdb59d500b9fae8013a6c49d486128c5afe55d041f669
SHA51260b64a080b4f2da8c3be29cc044b699ebeb09590275a96d12d6504fa80fa7405f61908fc2a84cc85c197dad4f1f1e881c09aff35aaa8b412c5776d2b2205ee59