Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23/02/2024, 19:49
Behavioral task
behavioral1
Sample
2024-02-23_7c29ca28d36cdbf95defa40691ca3abc_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-23_7c29ca28d36cdbf95defa40691ca3abc_cryptolocker.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-23_7c29ca28d36cdbf95defa40691ca3abc_cryptolocker.exe
-
Size
87KB
-
MD5
7c29ca28d36cdbf95defa40691ca3abc
-
SHA1
f8650c3ce7b0717339d46e816d297cde825d6bd8
-
SHA256
4a53ce56a0c2476b0ce9ecd2dd983dde05f42eb68c545c2605c7a40b37e05957
-
SHA512
734001a6f2a754ef9ac43725c339689870c4ad6012504488b17c004fcc97c672461cd6fdfb199043cdd5c3abacf4f596a2a4bcbd738061a0cdbff2b7ce762ff1
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgS4X:AnBdOOtEvwDpj6zf
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral1/memory/2220-0-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000b00000001225e-11.dat CryptoLocker_rule2 behavioral1/memory/2220-15-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2988-17-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2988-27-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 5 IoCs
resource yara_rule behavioral1/memory/2220-0-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral1/files/0x000b00000001225e-11.dat CryptoLocker_set1 behavioral1/memory/2220-15-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral1/memory/2988-17-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral1/memory/2988-27-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 -
UPX dump on OEP (original entry point) 5 IoCs
resource yara_rule behavioral1/memory/2220-0-0x0000000000500000-0x000000000050F000-memory.dmp UPX behavioral1/files/0x000b00000001225e-11.dat UPX behavioral1/memory/2220-15-0x0000000000500000-0x000000000050F000-memory.dmp UPX behavioral1/memory/2988-17-0x0000000000500000-0x000000000050F000-memory.dmp UPX behavioral1/memory/2988-27-0x0000000000500000-0x000000000050F000-memory.dmp UPX -
Executes dropped EXE 1 IoCs
pid Process 2988 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2220 2024-02-23_7c29ca28d36cdbf95defa40691ca3abc_cryptolocker.exe -
resource yara_rule behavioral1/memory/2220-0-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/files/0x000b00000001225e-11.dat upx behavioral1/memory/2220-15-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/memory/2988-17-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/memory/2988-27-0x0000000000500000-0x000000000050F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2988 2220 2024-02-23_7c29ca28d36cdbf95defa40691ca3abc_cryptolocker.exe 28 PID 2220 wrote to memory of 2988 2220 2024-02-23_7c29ca28d36cdbf95defa40691ca3abc_cryptolocker.exe 28 PID 2220 wrote to memory of 2988 2220 2024-02-23_7c29ca28d36cdbf95defa40691ca3abc_cryptolocker.exe 28 PID 2220 wrote to memory of 2988 2220 2024-02-23_7c29ca28d36cdbf95defa40691ca3abc_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-23_7c29ca28d36cdbf95defa40691ca3abc_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-23_7c29ca28d36cdbf95defa40691ca3abc_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87KB
MD589530fb4b5c35bc954e41b492c41bfc8
SHA14b4e636617d16dc17228af818ae83b6e0d4a142e
SHA256f6f833a372292eaeb74ee0f74d5649b5addff14caa755e4e5fa944101b90b333
SHA512979578aee7cc7b844546c8a0aa5f44bd525eb3f2daf50c4cd4f302571a61da36496bbfbc824c52fe891bf3c054a36238e4e9791847daa23c1f07def943e3e3de