Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 19:33
Behavioral task
behavioral1
Sample
2024-05-14_65e1a94fa9c0229badc491fa3f7baf5a_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-14_65e1a94fa9c0229badc491fa3f7baf5a_cryptolocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-14_65e1a94fa9c0229badc491fa3f7baf5a_cryptolocker.exe
-
Size
51KB
-
MD5
65e1a94fa9c0229badc491fa3f7baf5a
-
SHA1
e337dfad17b3b6b66f88055c94d47b8a320c9cf7
-
SHA256
cc661d80c06303c789a2200af731449d42c423abf9dbff4d0dad48b5d8f2f470
-
SHA512
7724335d22d882c7ee1c5dad948585af1a766b7290aecd1b8ef9fa5b955ec5a18d3bd4ccd5d3d15ff31ee8447693b0dab9c06cc58201bcd1e70caa5de6754bd8
-
SSDEEP
768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtO9:bODOw9acifAoc+v6
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral1/memory/2580-0-0x0000000008000000-0x000000000800F000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000b000000012286-11.dat CryptoLocker_rule2 behavioral1/memory/2580-15-0x0000000008000000-0x000000000800F000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2680-16-0x0000000008000000-0x000000000800F000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2680-26-0x0000000008000000-0x000000000800F000-memory.dmp CryptoLocker_rule2 -
UPX dump on OEP (original entry point) 5 IoCs
resource yara_rule behavioral1/memory/2580-0-0x0000000008000000-0x000000000800F000-memory.dmp UPX behavioral1/files/0x000b000000012286-11.dat UPX behavioral1/memory/2580-15-0x0000000008000000-0x000000000800F000-memory.dmp UPX behavioral1/memory/2680-16-0x0000000008000000-0x000000000800F000-memory.dmp UPX behavioral1/memory/2680-26-0x0000000008000000-0x000000000800F000-memory.dmp UPX -
Executes dropped EXE 1 IoCs
pid Process 2680 lossy.exe -
Loads dropped DLL 1 IoCs
pid Process 2580 2024-05-14_65e1a94fa9c0229badc491fa3f7baf5a_cryptolocker.exe -
resource yara_rule behavioral1/memory/2580-0-0x0000000008000000-0x000000000800F000-memory.dmp upx behavioral1/files/0x000b000000012286-11.dat upx behavioral1/memory/2580-15-0x0000000008000000-0x000000000800F000-memory.dmp upx behavioral1/memory/2680-16-0x0000000008000000-0x000000000800F000-memory.dmp upx behavioral1/memory/2680-26-0x0000000008000000-0x000000000800F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2580 wrote to memory of 2680 2580 2024-05-14_65e1a94fa9c0229badc491fa3f7baf5a_cryptolocker.exe 28 PID 2580 wrote to memory of 2680 2580 2024-05-14_65e1a94fa9c0229badc491fa3f7baf5a_cryptolocker.exe 28 PID 2580 wrote to memory of 2680 2580 2024-05-14_65e1a94fa9c0229badc491fa3f7baf5a_cryptolocker.exe 28 PID 2580 wrote to memory of 2680 2580 2024-05-14_65e1a94fa9c0229badc491fa3f7baf5a_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-14_65e1a94fa9c0229badc491fa3f7baf5a_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-14_65e1a94fa9c0229badc491fa3f7baf5a_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\lossy.exe"C:\Users\Admin\AppData\Local\Temp\lossy.exe"2⤵
- Executes dropped EXE
PID:2680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD5a85f409192332a4f5e0ccf2c70324c38
SHA175cdd9b08a74e07b29cbdc5791b20e0379f60dbd
SHA256dc5e8db259bbb9a3f215066997cd980fd748dc51134cb2e30b57231bcbf14b7d
SHA5128a87464c8006b3322495bf59a96e8cd0c9e57c855eec170f259f27bd272ed3015828699f7c5fd584a9bcb5e01deb10eebc7a4931b089dbd641a49707025b9d9b