Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 15:34
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-21_42d1ad3c862a1d4bf50a9e217045c112_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-21_42d1ad3c862a1d4bf50a9e217045c112_cryptolocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-21_42d1ad3c862a1d4bf50a9e217045c112_cryptolocker.exe
-
Size
50KB
-
MD5
42d1ad3c862a1d4bf50a9e217045c112
-
SHA1
632ee34968e239258b47b9a10a237b280dc09208
-
SHA256
90dd8182b945cc91c4a80491e780ee1a88336b6adc0cc271a677d89fad0cd850
-
SHA512
a92ad153ec3a1d92eadb9cd50157519c4a564eeba1d329f7d726bd24362df1182c36e0cc6c0b583dd67cd4a2e6ffbf0e65983f1aa28847da328a64200844dd7e
-
SSDEEP
768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mocc9:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ7
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3028-1-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 \Users\Admin\AppData\Local\Temp\asih.exe CryptoLocker_rule2 behavioral1/memory/3028-12-0x0000000000640000-0x0000000000650000-memory.dmp CryptoLocker_rule2 behavioral1/memory/3028-17-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2592-27-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 3 IoCs
Processes:
resource yara_rule behavioral1/memory/3028-1-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 behavioral1/memory/3028-17-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 behavioral1/memory/2592-27-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 -
UPX dump on OEP (original entry point) 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3028-1-0x0000000000500000-0x0000000000510000-memory.dmp UPX \Users\Admin\AppData\Local\Temp\asih.exe UPX behavioral1/memory/3028-12-0x0000000000640000-0x0000000000650000-memory.dmp UPX behavioral1/memory/3028-17-0x0000000000500000-0x0000000000510000-memory.dmp UPX behavioral1/memory/2592-27-0x0000000000500000-0x0000000000510000-memory.dmp UPX -
Executes dropped EXE 1 IoCs
Processes:
asih.exepid process 2592 asih.exe -
Loads dropped DLL 1 IoCs
Processes:
2024-05-21_42d1ad3c862a1d4bf50a9e217045c112_cryptolocker.exepid process 3028 2024-05-21_42d1ad3c862a1d4bf50a9e217045c112_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
2024-05-21_42d1ad3c862a1d4bf50a9e217045c112_cryptolocker.exedescription pid process target process PID 3028 wrote to memory of 2592 3028 2024-05-21_42d1ad3c862a1d4bf50a9e217045c112_cryptolocker.exe asih.exe PID 3028 wrote to memory of 2592 3028 2024-05-21_42d1ad3c862a1d4bf50a9e217045c112_cryptolocker.exe asih.exe PID 3028 wrote to memory of 2592 3028 2024-05-21_42d1ad3c862a1d4bf50a9e217045c112_cryptolocker.exe asih.exe PID 3028 wrote to memory of 2592 3028 2024-05-21_42d1ad3c862a1d4bf50a9e217045c112_cryptolocker.exe asih.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-21_42d1ad3c862a1d4bf50a9e217045c112_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-21_42d1ad3c862a1d4bf50a9e217045c112_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD5c486640f96f6f1e2cce2e18f822f0d19
SHA175f9914318b8cf494a44f6705abd3cc97a31add2
SHA256f0911769104668abdaaafc958e45dc0d0304c03822438b5aaf17e87741f6824a
SHA512b6156b575ac36a89f6c530f00ec6f97bf701a7a9d0e9dcf8d405b6c9cafe5c426668125ea5db51111d54b640e2814d23c3e1a83c71bdb24ac0a2fa8da3b7da98