Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
05-04-2024 03:41
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-05_4dcd10213e8d93351c6b627679cc098f_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-04-05_4dcd10213e8d93351c6b627679cc098f_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-05_4dcd10213e8d93351c6b627679cc098f_cryptolocker.exe
-
Size
48KB
-
MD5
4dcd10213e8d93351c6b627679cc098f
-
SHA1
f8c860c5d5a958d0d05e3af9d703511541efb16d
-
SHA256
e1e6812104e3dae9371c95772466818e12e18a718b0feec5befd64ed2839b8b2
-
SHA512
32ba452c64e917944767aaf5aedd17671261210f6605fad9f04423fbaf30f6c7c008f2562547f864b9dce0826421725ea46369ed8e68ed047a85d3cbcbcfe904
-
SSDEEP
1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ6uMcB:BbdDmjr+OtEvwDpjM1
Malware Config
Signatures
-
Detection of CryptoLocker Variants 6 IoCs
resource yara_rule behavioral1/memory/2308-0-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000c000000013a3f-11.dat CryptoLocker_rule2 behavioral1/memory/2308-15-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral1/memory/1804-17-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2308-13-0x0000000002BC0000-0x0000000002BD0000-memory.dmp CryptoLocker_rule2 behavioral1/memory/1804-26-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 4 IoCs
resource yara_rule behavioral1/memory/2308-0-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 behavioral1/memory/2308-15-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 behavioral1/memory/1804-17-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 behavioral1/memory/1804-26-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 -
UPX dump on OEP (original entry point) 6 IoCs
resource yara_rule behavioral1/memory/2308-0-0x0000000000500000-0x0000000000510000-memory.dmp UPX behavioral1/files/0x000c000000013a3f-11.dat UPX behavioral1/memory/2308-15-0x0000000000500000-0x0000000000510000-memory.dmp UPX behavioral1/memory/1804-17-0x0000000000500000-0x0000000000510000-memory.dmp UPX behavioral1/memory/2308-13-0x0000000002BC0000-0x0000000002BD0000-memory.dmp UPX behavioral1/memory/1804-26-0x0000000000500000-0x0000000000510000-memory.dmp UPX -
Executes dropped EXE 1 IoCs
pid Process 1804 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2308 2024-04-05_4dcd10213e8d93351c6b627679cc098f_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2308 wrote to memory of 1804 2308 2024-04-05_4dcd10213e8d93351c6b627679cc098f_cryptolocker.exe 28 PID 2308 wrote to memory of 1804 2308 2024-04-05_4dcd10213e8d93351c6b627679cc098f_cryptolocker.exe 28 PID 2308 wrote to memory of 1804 2308 2024-04-05_4dcd10213e8d93351c6b627679cc098f_cryptolocker.exe 28 PID 2308 wrote to memory of 1804 2308 2024-04-05_4dcd10213e8d93351c6b627679cc098f_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-05_4dcd10213e8d93351c6b627679cc098f_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-05_4dcd10213e8d93351c6b627679cc098f_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:1804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD5740d93df70c35fc8f7e001c8f6834ab6
SHA1ba1d56aae30614b68a55ae56ef39ce8315eb2b3f
SHA256c6e0aefbae2371964eb3ad6fba4b2352d04ea79a64cd3f15a0b7c098a478dd37
SHA512278583248843a40dfc4ce073ef262da45d7abeb41b40481d3f72a4680972892dc41b07bf1f5bb9e069e5c10d7059ecabd66e82f5080e3445a0898a6d6fe4d9ef