Analysis
-
max time kernel
10s -
max time network
15s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2024 19:29
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-27_51cb8b58e695f8ef7cff4a95e4486b82_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-27_51cb8b58e695f8ef7cff4a95e4486b82_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-27_51cb8b58e695f8ef7cff4a95e4486b82_cryptolocker.exe
-
Size
61KB
-
MD5
51cb8b58e695f8ef7cff4a95e4486b82
-
SHA1
a8b8640e055b317b7eb4d8cfe34eb6a104f1e2d3
-
SHA256
1aa8c2c0deb0caffe7999cd1a00867375e79a8b4f0ec6672394d01cb036e23d9
-
SHA512
4976ac881cc086bd054014a2412e0c2491815b54d9becc8bfdbba25dd48b10dd14fcf208e62cc9838b4cba5131200194f4bb9e8a39ff1e8cdeda595c4d26570e
-
SSDEEP
1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsir:BbdDmjr+OtEvwDpjM8m
Malware Config
Signatures
-
Detection of CryptoLocker Variants 3 IoCs
resource yara_rule behavioral2/memory/4004-0-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral2/files/0x0007000000023224-13.dat CryptoLocker_rule2 behavioral2/memory/4004-17-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral2/memory/4004-17-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 -
UPX dump on OEP (original entry point) 3 IoCs
resource yara_rule behavioral2/memory/4004-0-0x0000000000500000-0x0000000000510000-memory.dmp UPX behavioral2/files/0x0007000000023224-13.dat UPX behavioral2/memory/4004-17-0x0000000000500000-0x0000000000510000-memory.dmp UPX -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-27_51cb8b58e695f8ef7cff4a95e4486b82_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-27_51cb8b58e695f8ef7cff4a95e4486b82_cryptolocker.exe"1⤵PID:4004
-
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵PID:1868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5a45d9aca585b6450030190b951a9ff7c
SHA133030b00c3fc2503c8c9e38419f820e151db91a1
SHA25668bd56758a73e360278f63119c1f8a23aedd9606a6f97aed9fe8f2310b40cedc
SHA512ff93cd771f5038f9426d8a0bd6ff07b03d13853c9bbfb8c2d91bd25e7df2c6c2b7734805db6b9954e2e7b7457782d10a8d6a291995fa7ae2784d12faedd2ffea