Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 12:52
Behavioral task
behavioral1
Sample
2024-02-13_9736c4ef9807ad912eb5917c98963c08_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-13_9736c4ef9807ad912eb5917c98963c08_cryptolocker.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-02-13_9736c4ef9807ad912eb5917c98963c08_cryptolocker.exe
-
Size
58KB
-
MD5
9736c4ef9807ad912eb5917c98963c08
-
SHA1
00d418d5e45ef5a3f9183dc88c92b3c4228dbd02
-
SHA256
82309afe570cd979c77841864fe765268972313c4d02c70928b381ab96a46fa4
-
SHA512
172068a95486236ecf2c661b2b89e213d65c30ab3f35434e9c65996b6f52c46c20d6166de430ed0b2dd1a3c42e0423161852354b5592b889cee96381f7310608
-
SSDEEP
768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5appgcmM:z6QFElP6n+gKmddpMOtEvwDpj9aYaQ3M
Malware Config
Signatures
-
Detection of CryptoLocker Variants 6 IoCs
resource yara_rule behavioral1/memory/2476-0-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x0009000000012252-11.dat CryptoLocker_rule2 behavioral1/memory/2476-15-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2352-17-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2476-27-0x00000000026C0000-0x00000000026D0000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2352-28-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 6 IoCs
resource yara_rule behavioral1/memory/2476-0-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 behavioral1/files/0x0009000000012252-11.dat CryptoLocker_set1 behavioral1/memory/2476-15-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 behavioral1/memory/2352-17-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 behavioral1/memory/2476-27-0x00000000026C0000-0x00000000026D0000-memory.dmp CryptoLocker_set1 behavioral1/memory/2352-28-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 -
UPX dump on OEP (original entry point) 6 IoCs
resource yara_rule behavioral1/memory/2476-0-0x0000000000500000-0x0000000000510000-memory.dmp UPX behavioral1/files/0x0009000000012252-11.dat UPX behavioral1/memory/2476-15-0x0000000000500000-0x0000000000510000-memory.dmp UPX behavioral1/memory/2352-17-0x0000000000500000-0x0000000000510000-memory.dmp UPX behavioral1/memory/2476-27-0x00000000026C0000-0x00000000026D0000-memory.dmp UPX behavioral1/memory/2352-28-0x0000000000500000-0x0000000000510000-memory.dmp UPX -
Executes dropped EXE 1 IoCs
pid Process 2352 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2476 2024-02-13_9736c4ef9807ad912eb5917c98963c08_cryptolocker.exe -
resource yara_rule behavioral1/memory/2476-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x0009000000012252-11.dat upx behavioral1/memory/2476-15-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2352-17-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2476-27-0x00000000026C0000-0x00000000026D0000-memory.dmp upx behavioral1/memory/2352-28-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2476 wrote to memory of 2352 2476 2024-02-13_9736c4ef9807ad912eb5917c98963c08_cryptolocker.exe 28 PID 2476 wrote to memory of 2352 2476 2024-02-13_9736c4ef9807ad912eb5917c98963c08_cryptolocker.exe 28 PID 2476 wrote to memory of 2352 2476 2024-02-13_9736c4ef9807ad912eb5917c98963c08_cryptolocker.exe 28 PID 2476 wrote to memory of 2352 2476 2024-02-13_9736c4ef9807ad912eb5917c98963c08_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_9736c4ef9807ad912eb5917c98963c08_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-13_9736c4ef9807ad912eb5917c98963c08_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD54f75c2b547647240c8afb7802f456b05
SHA108cfbba0dbf7bd1891c5027b98ad298de9bc3f26
SHA256f16d7b62412352db3bebaadd33452a807c5b65a6e8ed325d51da424d182f8146
SHA512bece0a9f55765caeb03574ab53f96de7688c0477fc0d2ea0f011da2157fa55db0358d8043e25645c9e382ceb0852574b5a3ac8e29998f70fab269563743de9df