Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
10-05-2024 03:56
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-10_6cc0fdeb722b7af5ac9988a03e30d018_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-05-10_6cc0fdeb722b7af5ac9988a03e30d018_cryptolocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-10_6cc0fdeb722b7af5ac9988a03e30d018_cryptolocker.exe
-
Size
50KB
-
MD5
6cc0fdeb722b7af5ac9988a03e30d018
-
SHA1
8265dd4e4b053311807854b11b3d6e5374464e04
-
SHA256
dc7779bcd7a1b2bc1b6643ea92ca13a08531c3aac6bc89e40e15b623f5624311
-
SHA512
57448f7a8b47616c8f1a31f5e3607f1fbe45145accb5bc56b5d88c1a1296a9bba393710779569adb11ba62a76439643d0c1dae82227d07154eb44a5873ad238f
-
SSDEEP
768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Moccn:qmbhXDmjr5MOtEvwDpj5cDtKkQZQx
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral1/memory/1712-1-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000a000000015f7a-11.dat CryptoLocker_rule2 behavioral1/memory/1712-16-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2748-17-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2748-27-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 4 IoCs
resource yara_rule behavioral1/memory/1712-1-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 behavioral1/memory/1712-16-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 behavioral1/memory/2748-17-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 behavioral1/memory/2748-27-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 -
UPX dump on OEP (original entry point) 5 IoCs
resource yara_rule behavioral1/memory/1712-1-0x0000000000500000-0x0000000000510000-memory.dmp UPX behavioral1/files/0x000a000000015f7a-11.dat UPX behavioral1/memory/1712-16-0x0000000000500000-0x0000000000510000-memory.dmp UPX behavioral1/memory/2748-17-0x0000000000500000-0x0000000000510000-memory.dmp UPX behavioral1/memory/2748-27-0x0000000000500000-0x0000000000510000-memory.dmp UPX -
Executes dropped EXE 1 IoCs
pid Process 2748 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1712 2024-05-10_6cc0fdeb722b7af5ac9988a03e30d018_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2748 1712 2024-05-10_6cc0fdeb722b7af5ac9988a03e30d018_cryptolocker.exe 28 PID 1712 wrote to memory of 2748 1712 2024-05-10_6cc0fdeb722b7af5ac9988a03e30d018_cryptolocker.exe 28 PID 1712 wrote to memory of 2748 1712 2024-05-10_6cc0fdeb722b7af5ac9988a03e30d018_cryptolocker.exe 28 PID 1712 wrote to memory of 2748 1712 2024-05-10_6cc0fdeb722b7af5ac9988a03e30d018_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_6cc0fdeb722b7af5ac9988a03e30d018_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-10_6cc0fdeb722b7af5ac9988a03e30d018_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD578818da0bc423e1e04b662f77e9c5b6f
SHA10bba055f62929dd848d8877c65591702cf0247d1
SHA256a8e25915c789a2206b85521b626c26f8700853236e4e9ee4b833db8f36c3dcc7
SHA51254adfadd8448613c712ab3b446477ab09bf9c9fa966f48574b6a09c0ba1f6107fd1620ace38435b42b73c9d4a0561a232d733b32dc443579fa4b0dda62d43a6a