Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29/03/2024, 03:36
Behavioral task
behavioral1
Sample
2024-03-29_4e69fb6ba8edd8d16896f735727a5bd0_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-03-29_4e69fb6ba8edd8d16896f735727a5bd0_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-29_4e69fb6ba8edd8d16896f735727a5bd0_cryptolocker.exe
-
Size
50KB
-
MD5
4e69fb6ba8edd8d16896f735727a5bd0
-
SHA1
0907fe6f1c22a2a15314f87b8f62ce46ad134c7c
-
SHA256
559bd64ca1211cf6b9e277d01126b5893e64581198710248ffc94078842f12b2
-
SHA512
8044a60a9f3c5749444d16ece352182c0f19f075f5d9d098e436b3ec52e6a00fffae09a2f737f72440fd3a8eaabbd691ac8568db97aba26b3ed9713fb29b5e93
-
SSDEEP
768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YY1J+OTe:z6QFElP6n+gKmddpMOtEvwDpj31i
Malware Config
Signatures
-
Detection of CryptoLocker Variants 6 IoCs
resource yara_rule behavioral1/memory/2268-0-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000d0000000122a8-11.dat CryptoLocker_rule2 behavioral1/memory/2268-15-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral1/memory/1736-17-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2268-14-0x0000000000670000-0x0000000000680000-memory.dmp CryptoLocker_rule2 behavioral1/memory/1736-27-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 6 IoCs
resource yara_rule behavioral1/memory/2268-0-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 behavioral1/files/0x000d0000000122a8-11.dat CryptoLocker_set1 behavioral1/memory/2268-15-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 behavioral1/memory/1736-17-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 behavioral1/memory/2268-14-0x0000000000670000-0x0000000000680000-memory.dmp CryptoLocker_set1 behavioral1/memory/1736-27-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 -
UPX dump on OEP (original entry point) 5 IoCs
resource yara_rule behavioral1/memory/2268-0-0x0000000000500000-0x0000000000510000-memory.dmp UPX behavioral1/files/0x000d0000000122a8-11.dat UPX behavioral1/memory/2268-15-0x0000000000500000-0x0000000000510000-memory.dmp UPX behavioral1/memory/1736-17-0x0000000000500000-0x0000000000510000-memory.dmp UPX behavioral1/memory/1736-27-0x0000000000500000-0x0000000000510000-memory.dmp UPX -
Executes dropped EXE 1 IoCs
pid Process 1736 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2268 2024-03-29_4e69fb6ba8edd8d16896f735727a5bd0_cryptolocker.exe -
resource yara_rule behavioral1/memory/2268-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x000d0000000122a8-11.dat upx behavioral1/memory/2268-15-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/1736-17-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/1736-27-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2268 wrote to memory of 1736 2268 2024-03-29_4e69fb6ba8edd8d16896f735727a5bd0_cryptolocker.exe 28 PID 2268 wrote to memory of 1736 2268 2024-03-29_4e69fb6ba8edd8d16896f735727a5bd0_cryptolocker.exe 28 PID 2268 wrote to memory of 1736 2268 2024-03-29_4e69fb6ba8edd8d16896f735727a5bd0_cryptolocker.exe 28 PID 2268 wrote to memory of 1736 2268 2024-03-29_4e69fb6ba8edd8d16896f735727a5bd0_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_4e69fb6ba8edd8d16896f735727a5bd0_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-29_4e69fb6ba8edd8d16896f735727a5bd0_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:1736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD52f02947acfb60e5e9341f9ae501ebf1c
SHA1438fe2d65e9048448d6b31bca4cda7d6fbe43abb
SHA256d51bc35851da93c0678edd147ead5557670f12d81747f596827fad0146fa06ae
SHA51262023395878333695e1a8957aca86cac76e7ac2dcb6e4f6a0625ae722a40de15db3792948c85aafd0aca5a100372d2cfbf5dcaf3433004622e3a1f1baa617a26