Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/04/2024, 18:25
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-27_0c25490833b52e6202f147da7d22b2f7_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-27_0c25490833b52e6202f147da7d22b2f7_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-27_0c25490833b52e6202f147da7d22b2f7_cryptolocker.exe
-
Size
31KB
-
MD5
0c25490833b52e6202f147da7d22b2f7
-
SHA1
508e612d720c053025aa7bb079dfdb124b2fa278
-
SHA256
0854a06f4b1271cfc12b311901d986fd8e3c263f54e08b1453554070add1895e
-
SHA512
951df33ecf3b0ce53c320819f931f6de56810cbf0c8715758fd2708fc16b8a59b7afe42cbcbc2e1e760e78cd2223b169ce4017006a5411ecbe4f328c9fab4a35
-
SSDEEP
768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIOc+4tHurJm:q0zizzOSxMOtEvwDpj/arqd
Malware Config
Signatures
-
Detection of CryptoLocker Variants 4 IoCs
resource yara_rule behavioral1/memory/112-0-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000d000000012346-11.dat CryptoLocker_rule2 behavioral1/memory/112-16-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral1/memory/1580-25-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 2 IoCs
resource yara_rule behavioral1/memory/112-16-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 behavioral1/memory/1580-25-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 -
UPX dump on OEP (original entry point) 4 IoCs
resource yara_rule behavioral1/memory/112-0-0x0000000000500000-0x0000000000510000-memory.dmp UPX behavioral1/files/0x000d000000012346-11.dat UPX behavioral1/memory/112-16-0x0000000000500000-0x0000000000510000-memory.dmp UPX behavioral1/memory/1580-25-0x0000000000500000-0x0000000000510000-memory.dmp UPX -
Executes dropped EXE 1 IoCs
pid Process 1580 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 112 2024-04-27_0c25490833b52e6202f147da7d22b2f7_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 112 wrote to memory of 1580 112 2024-04-27_0c25490833b52e6202f147da7d22b2f7_cryptolocker.exe 28 PID 112 wrote to memory of 1580 112 2024-04-27_0c25490833b52e6202f147da7d22b2f7_cryptolocker.exe 28 PID 112 wrote to memory of 1580 112 2024-04-27_0c25490833b52e6202f147da7d22b2f7_cryptolocker.exe 28 PID 112 wrote to memory of 1580 112 2024-04-27_0c25490833b52e6202f147da7d22b2f7_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-27_0c25490833b52e6202f147da7d22b2f7_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-27_0c25490833b52e6202f147da7d22b2f7_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:1580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD57f2b549d8af6e5e787c672f3c8b440f6
SHA1e0ece47e7605ede9b5f4fd9eef5dfb180c8cef9f
SHA2564f06735706445605ad791598253a0cb2e14c477c0246531b7e16a6140a00c378
SHA512a8bdcb90cde6a3f92373f3d12f4fa3ad574f40cf4778b2b9f99b2dff5fb16ed386c4a01e5d8e695c66e933c5023123bec776ae8da5ec4d3fcb9501da8ef81206