Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 08:00
Behavioral task
behavioral1
Sample
2024-02-28_abb7627ee4de509b48121e7fbf6a34f2_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-28_abb7627ee4de509b48121e7fbf6a34f2_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-02-28_abb7627ee4de509b48121e7fbf6a34f2_cryptolocker.exe
-
Size
105KB
-
MD5
abb7627ee4de509b48121e7fbf6a34f2
-
SHA1
4e7c924062d881ebe16db88b151c204ce5269ff0
-
SHA256
a20f3f08f38e1f8c7a4d68767646167a67a306a55c9d9e10e54ab43ef4a5b9a8
-
SHA512
5efc2920f86b844c7585c0be6ee32c391893f8593ae15be9f616a1e2673915dc01b1f6a7b19b9cc432f35491b2cfa342c438d4b293dee86188c256aaa5f583e5
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GksaLOl:1nK6a+qdOOtEvwDpjpl
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral2/memory/4004-0-0x0000000000500000-0x000000000050F311-memory.dmp CryptoLocker_rule2 behavioral2/files/0x0008000000023221-13.dat CryptoLocker_rule2 behavioral2/memory/2932-17-0x0000000000500000-0x000000000050F311-memory.dmp CryptoLocker_rule2 behavioral2/memory/4004-18-0x0000000000500000-0x000000000050F311-memory.dmp CryptoLocker_rule2 behavioral2/memory/2932-27-0x0000000000500000-0x000000000050F311-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 5 IoCs
resource yara_rule behavioral2/memory/4004-0-0x0000000000500000-0x000000000050F311-memory.dmp CryptoLocker_set1 behavioral2/files/0x0008000000023221-13.dat CryptoLocker_set1 behavioral2/memory/2932-17-0x0000000000500000-0x000000000050F311-memory.dmp CryptoLocker_set1 behavioral2/memory/4004-18-0x0000000000500000-0x000000000050F311-memory.dmp CryptoLocker_set1 behavioral2/memory/2932-27-0x0000000000500000-0x000000000050F311-memory.dmp CryptoLocker_set1 -
UPX dump on OEP (original entry point) 5 IoCs
resource yara_rule behavioral2/memory/4004-0-0x0000000000500000-0x000000000050F311-memory.dmp UPX behavioral2/files/0x0008000000023221-13.dat UPX behavioral2/memory/2932-17-0x0000000000500000-0x000000000050F311-memory.dmp UPX behavioral2/memory/4004-18-0x0000000000500000-0x000000000050F311-memory.dmp UPX behavioral2/memory/2932-27-0x0000000000500000-0x000000000050F311-memory.dmp UPX -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation 2024-02-28_abb7627ee4de509b48121e7fbf6a34f2_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 2932 asih.exe -
resource yara_rule behavioral2/memory/4004-0-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral2/files/0x0008000000023221-13.dat upx behavioral2/memory/2932-17-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral2/memory/4004-18-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral2/memory/2932-27-0x0000000000500000-0x000000000050F311-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4004 wrote to memory of 2932 4004 2024-02-28_abb7627ee4de509b48121e7fbf6a34f2_cryptolocker.exe 90 PID 4004 wrote to memory of 2932 4004 2024-02-28_abb7627ee4de509b48121e7fbf6a34f2_cryptolocker.exe 90 PID 4004 wrote to memory of 2932 4004 2024-02-28_abb7627ee4de509b48121e7fbf6a34f2_cryptolocker.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-28_abb7627ee4de509b48121e7fbf6a34f2_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-28_abb7627ee4de509b48121e7fbf6a34f2_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD51b348c56b45dc11d0cf91d6d3f93fb69
SHA1c593e7cef3d06be3c1aee9ca98f955221e90e02b
SHA2565bbd6fd717474a4bc17bf84e6e99dd58c6fc817c84e98e96fb37b30d4bcc1a8e
SHA5128a3c67c74d58e33be8176cd616da0565f04df23380bdddcce894962c9a1933d902da84f525e4cf5e6bc3f8bc05ba171647bbda580bceb22da2228187a2bbe128