Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 14:55
Behavioral task
behavioral1
Sample
2024-05-22_994e01a48d213397e58d6a07dbbcc09f_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-22_994e01a48d213397e58d6a07dbbcc09f_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-22_994e01a48d213397e58d6a07dbbcc09f_cryptolocker.exe
-
Size
39KB
-
MD5
994e01a48d213397e58d6a07dbbcc09f
-
SHA1
3fd731577d42b2d7cf1d80af6ade1062f85cc38f
-
SHA256
4c265e2de5d922bf14a6bf5d87c22d5f4a235d0195715a851931df78c67da3ff
-
SHA512
eb0bc5accf91fb138b2343d77e72c4c1c966559871b7e2e034b288db665b6993965f9a90eabc40dea500b830dcf8189e65865f3a318fc5d237b84e1101f7a850
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYoa:qDdFJy3QMOtEvwDpjjWMl7Tla
Malware Config
Signatures
-
Detection of CryptoLocker Variants 4 IoCs
resource yara_rule behavioral1/memory/788-0-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000a000000012286-11.dat CryptoLocker_rule2 behavioral1/memory/788-15-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2936-26-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 4 IoCs
resource yara_rule behavioral1/memory/788-0-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 behavioral1/files/0x000a000000012286-11.dat CryptoLocker_set1 behavioral1/memory/788-15-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 behavioral1/memory/2936-26-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 -
UPX dump on OEP (original entry point) 4 IoCs
resource yara_rule behavioral1/memory/788-0-0x0000000000500000-0x0000000000510000-memory.dmp UPX behavioral1/files/0x000a000000012286-11.dat UPX behavioral1/memory/788-15-0x0000000000500000-0x0000000000510000-memory.dmp UPX behavioral1/memory/2936-26-0x0000000000500000-0x0000000000510000-memory.dmp UPX -
Executes dropped EXE 1 IoCs
pid Process 2936 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 788 2024-05-22_994e01a48d213397e58d6a07dbbcc09f_cryptolocker.exe -
resource yara_rule behavioral1/memory/788-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x000a000000012286-11.dat upx behavioral1/memory/788-15-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2936-26-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 788 wrote to memory of 2936 788 2024-05-22_994e01a48d213397e58d6a07dbbcc09f_cryptolocker.exe 28 PID 788 wrote to memory of 2936 788 2024-05-22_994e01a48d213397e58d6a07dbbcc09f_cryptolocker.exe 28 PID 788 wrote to memory of 2936 788 2024-05-22_994e01a48d213397e58d6a07dbbcc09f_cryptolocker.exe 28 PID 788 wrote to memory of 2936 788 2024-05-22_994e01a48d213397e58d6a07dbbcc09f_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_994e01a48d213397e58d6a07dbbcc09f_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-22_994e01a48d213397e58d6a07dbbcc09f_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5a153f6bb0ce3015c42d4146f88fe977c
SHA1436e8621147b48fb094cae2235514e239a28e334
SHA256ee092655a2ab7a32b1eb41ae4bfb98c85660388eedfc12b361062be4cfaa87bd
SHA512d611e187a12a70af5d22c3bdf0abd116efe384e3583c5fa5c25b2bfe7c84835750c41125e1cc209147c98832a76a45d9810a8b7e8bcc3cae39704b27782b490e