Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24-04-2024 15:00
Behavioral task
behavioral1
Sample
2024-04-24_c37a36690d1d0c5f25a3c32d9c96cd8c_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-04-24_c37a36690d1d0c5f25a3c32d9c96cd8c_cryptolocker.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-24_c37a36690d1d0c5f25a3c32d9c96cd8c_cryptolocker.exe
-
Size
80KB
-
MD5
c37a36690d1d0c5f25a3c32d9c96cd8c
-
SHA1
f84d58bfbfc01aa0d6cb6132b19125d2a19729ea
-
SHA256
bb44adf00f441b1f25e8772a76b276631cca862e8fc3769af0419e6e8ad66b19
-
SHA512
14a78a880f4a4ed288b2f36ab0588a30f0017f6d9897045ac7688ba4f1e3305dbb0207e2d01aaadb49d8fdd78dcea7d44496a704284b7a63806c69a4757a6afa
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdH:T6a+rdOOtEvwDpjNth
Malware Config
Signatures
-
Detection of CryptoLocker Variants 6 IoCs
resource yara_rule behavioral1/memory/1540-1-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral1/memory/1540-15-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral1/memory/1540-14-0x0000000002270000-0x0000000002280000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000a000000013a21-11.dat CryptoLocker_rule2 behavioral1/memory/2208-17-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2208-27-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 6 IoCs
resource yara_rule behavioral1/memory/1540-1-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 behavioral1/memory/1540-15-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 behavioral1/memory/1540-14-0x0000000002270000-0x0000000002280000-memory.dmp CryptoLocker_set1 behavioral1/files/0x000a000000013a21-11.dat CryptoLocker_set1 behavioral1/memory/2208-17-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 behavioral1/memory/2208-27-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 -
UPX dump on OEP (original entry point) 5 IoCs
resource yara_rule behavioral1/memory/1540-1-0x0000000000500000-0x0000000000510000-memory.dmp UPX behavioral1/memory/1540-15-0x0000000000500000-0x0000000000510000-memory.dmp UPX behavioral1/files/0x000a000000013a21-11.dat UPX behavioral1/memory/2208-17-0x0000000000500000-0x0000000000510000-memory.dmp UPX behavioral1/memory/2208-27-0x0000000000500000-0x0000000000510000-memory.dmp UPX -
Executes dropped EXE 1 IoCs
pid Process 2208 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1540 2024-04-24_c37a36690d1d0c5f25a3c32d9c96cd8c_cryptolocker.exe -
resource yara_rule behavioral1/memory/1540-1-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/1540-15-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x000a000000013a21-11.dat upx behavioral1/memory/2208-17-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2208-27-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1540 wrote to memory of 2208 1540 2024-04-24_c37a36690d1d0c5f25a3c32d9c96cd8c_cryptolocker.exe 28 PID 1540 wrote to memory of 2208 1540 2024-04-24_c37a36690d1d0c5f25a3c32d9c96cd8c_cryptolocker.exe 28 PID 1540 wrote to memory of 2208 1540 2024-04-24_c37a36690d1d0c5f25a3c32d9c96cd8c_cryptolocker.exe 28 PID 1540 wrote to memory of 2208 1540 2024-04-24_c37a36690d1d0c5f25a3c32d9c96cd8c_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-24_c37a36690d1d0c5f25a3c32d9c96cd8c_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-24_c37a36690d1d0c5f25a3c32d9c96cd8c_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD56e74ebf1833d27da3af841840b7bef57
SHA1d0ee43fa246605817f90f088670211512bc1f1a0
SHA2566768ae3d509dc56045e97244d3a403d4fc0c43dc8f8c6c609d9adcdb41da278c
SHA5120033a3f2d95a26609289f231c50a21edda14f65981e78d43d9c3edaac4127225f8684e5e9af62660116cdbbae028eee307a6e206016d5c63876d5bc761cc3501