Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-03-2024 18:29
Behavioral task
behavioral1
Sample
2024-03-05_66e9f9a3f578b98dcf14539f8077a2de_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-05_66e9f9a3f578b98dcf14539f8077a2de_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-05_66e9f9a3f578b98dcf14539f8077a2de_cryptolocker.exe
-
Size
34KB
-
MD5
66e9f9a3f578b98dcf14539f8077a2de
-
SHA1
f060d8985cc1aa7e220bfebff82a0f3a96ac86ff
-
SHA256
02694e62b418315ac19a4aabf099d7f349312e74ca884ec0613d6a7f3ecb4626
-
SHA512
f82459595d450cbe87951f65b936affb4766e59b0aaaa1b0da65a7edecc3b0f7f206504947a26db12f9841e412f40a6822f99914393d0ffc22f31a1b5d66bec6
-
SSDEEP
768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLam5axKuiJ:qUmnpomddpMOtEvwDpjjaYadY
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral1/memory/3048-0-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000d000000014466-11.dat CryptoLocker_rule2 behavioral1/memory/3048-15-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2568-17-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2568-27-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 5 IoCs
resource yara_rule behavioral1/memory/3048-0-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral1/files/0x000d000000014466-11.dat CryptoLocker_set1 behavioral1/memory/3048-15-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral1/memory/2568-17-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral1/memory/2568-27-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 -
UPX dump on OEP (original entry point) 5 IoCs
resource yara_rule behavioral1/memory/3048-0-0x0000000000500000-0x000000000050F000-memory.dmp UPX behavioral1/files/0x000d000000014466-11.dat UPX behavioral1/memory/3048-15-0x0000000000500000-0x000000000050F000-memory.dmp UPX behavioral1/memory/2568-17-0x0000000000500000-0x000000000050F000-memory.dmp UPX behavioral1/memory/2568-27-0x0000000000500000-0x000000000050F000-memory.dmp UPX -
Executes dropped EXE 1 IoCs
pid Process 2568 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 3048 2024-03-05_66e9f9a3f578b98dcf14539f8077a2de_cryptolocker.exe -
resource yara_rule behavioral1/memory/3048-0-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/files/0x000d000000014466-11.dat upx behavioral1/memory/3048-15-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/memory/2568-17-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/memory/2568-27-0x0000000000500000-0x000000000050F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2568 3048 2024-03-05_66e9f9a3f578b98dcf14539f8077a2de_cryptolocker.exe 28 PID 3048 wrote to memory of 2568 3048 2024-03-05_66e9f9a3f578b98dcf14539f8077a2de_cryptolocker.exe 28 PID 3048 wrote to memory of 2568 3048 2024-03-05_66e9f9a3f578b98dcf14539f8077a2de_cryptolocker.exe 28 PID 3048 wrote to memory of 2568 3048 2024-03-05_66e9f9a3f578b98dcf14539f8077a2de_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_66e9f9a3f578b98dcf14539f8077a2de_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-05_66e9f9a3f578b98dcf14539f8077a2de_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5fd22ceaf72756e1e494e6a13f697baa1
SHA1aed6bd0a547d4fa62f033fa95d37a5ebbb0b3616
SHA256c71362cc36c9478008c7c6400a369e40030e4448f88de1e47ccda373c60e9387
SHA512f164e88df03d2de136911188eff16a3052b61ff536e55d86e775278435dbccbf6490e6cbc3158bac971bac7e8e2ad2271af69502e33021c9ee81b88439134864