Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 23:34
Behavioral task
behavioral1
Sample
2024-03-15_627bfeca062bb5691fb9566f1a928eec_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-15_627bfeca062bb5691fb9566f1a928eec_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-15_627bfeca062bb5691fb9566f1a928eec_cryptolocker.exe
-
Size
72KB
-
MD5
627bfeca062bb5691fb9566f1a928eec
-
SHA1
dac277aa0b3801ec015dd1335d4069ea49b5a7e6
-
SHA256
4b1eba3c00dcf46b701789c31d56641a2fce8285316f43cbebaceb6fb83bdb53
-
SHA512
4b393283d47edd1e38b760075bcf849fd7feecb2148fa2fd3be52be86734256e0721f577fccd758d41bf17999407897931b8b618ceb13bb1cb1b721af4699237
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsaleFQ:1nK6a+qdOOtEvwDpjS
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral1/memory/2100-0-0x0000000000500000-0x000000000050F311-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000c000000012328-14.dat CryptoLocker_rule2 behavioral1/memory/2100-15-0x0000000000500000-0x000000000050F311-memory.dmp CryptoLocker_rule2 behavioral1/memory/2628-17-0x0000000000500000-0x000000000050F311-memory.dmp CryptoLocker_rule2 behavioral1/memory/2628-25-0x0000000000500000-0x000000000050F311-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 5 IoCs
resource yara_rule behavioral1/memory/2100-0-0x0000000000500000-0x000000000050F311-memory.dmp CryptoLocker_set1 behavioral1/files/0x000c000000012328-14.dat CryptoLocker_set1 behavioral1/memory/2100-15-0x0000000000500000-0x000000000050F311-memory.dmp CryptoLocker_set1 behavioral1/memory/2628-17-0x0000000000500000-0x000000000050F311-memory.dmp CryptoLocker_set1 behavioral1/memory/2628-25-0x0000000000500000-0x000000000050F311-memory.dmp CryptoLocker_set1 -
UPX dump on OEP (original entry point) 5 IoCs
resource yara_rule behavioral1/memory/2100-0-0x0000000000500000-0x000000000050F311-memory.dmp UPX behavioral1/files/0x000c000000012328-14.dat UPX behavioral1/memory/2100-15-0x0000000000500000-0x000000000050F311-memory.dmp UPX behavioral1/memory/2628-17-0x0000000000500000-0x000000000050F311-memory.dmp UPX behavioral1/memory/2628-25-0x0000000000500000-0x000000000050F311-memory.dmp UPX -
Executes dropped EXE 1 IoCs
pid Process 2628 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2100 2024-03-15_627bfeca062bb5691fb9566f1a928eec_cryptolocker.exe -
resource yara_rule behavioral1/memory/2100-0-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral1/files/0x000c000000012328-14.dat upx behavioral1/memory/2100-15-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral1/memory/2628-17-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral1/memory/2628-25-0x0000000000500000-0x000000000050F311-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2628 2100 2024-03-15_627bfeca062bb5691fb9566f1a928eec_cryptolocker.exe 28 PID 2100 wrote to memory of 2628 2100 2024-03-15_627bfeca062bb5691fb9566f1a928eec_cryptolocker.exe 28 PID 2100 wrote to memory of 2628 2100 2024-03-15_627bfeca062bb5691fb9566f1a928eec_cryptolocker.exe 28 PID 2100 wrote to memory of 2628 2100 2024-03-15_627bfeca062bb5691fb9566f1a928eec_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-15_627bfeca062bb5691fb9566f1a928eec_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-15_627bfeca062bb5691fb9566f1a928eec_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD57b1033ef6b10d33b6ab14a233ac484ab
SHA15b580f96b722a5da23a960c73b62138f3ff7712e
SHA256890efff22700c9bbcb724c16a421be6dbb6dc42a212d80ebea9969886d63069d
SHA512382c7fb5396bfa1376961cb3dcc204ed6f0987e33872ce1b5ad1eb2ef23e1d1d648ad84261b449e7e7db4e8e47419253b7d3a00e93101297123f378c2f3e593b