Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 22:51
Behavioral task
behavioral1
Sample
690dd31781d5f10a049aaf9dc73ca5d52b9f9d6ef26377fc9e1d9aa5744f0b8b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
690dd31781d5f10a049aaf9dc73ca5d52b9f9d6ef26377fc9e1d9aa5744f0b8b.exe
Resource
win10v2004-20240508-en
General
-
Target
690dd31781d5f10a049aaf9dc73ca5d52b9f9d6ef26377fc9e1d9aa5744f0b8b.exe
-
Size
34KB
-
MD5
8b48af49db0c66113530e9daaec8c5fc
-
SHA1
43dd0b7c091562d7a4b9853efac69aa5e3a26a8b
-
SHA256
690dd31781d5f10a049aaf9dc73ca5d52b9f9d6ef26377fc9e1d9aa5744f0b8b
-
SHA512
4c64c7b3fcb9a55c09bf0aa064ecd02cb8098bd2867fdf178f006f59e39b68512f4815ee9db0258ed7d368154d354c13a1e042fbff2c415b890a8cb462f82a0e
-
SSDEEP
768:bFPm5zusFUB2preAr+Ofjg0S16avdrQFiLjJvtXm:bFPmpiif/oc+vXm
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral1/memory/2104-0-0x0000000008000000-0x000000000800E000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000c0000000144e4-11.dat CryptoLocker_rule2 behavioral1/memory/2104-16-0x0000000008000000-0x000000000800E000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2756-18-0x0000000008000000-0x000000000800E000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2756-27-0x0000000008000000-0x000000000800E000-memory.dmp CryptoLocker_rule2 -
UPX dump on OEP (original entry point) 5 IoCs
resource yara_rule behavioral1/memory/2104-0-0x0000000008000000-0x000000000800E000-memory.dmp UPX behavioral1/files/0x000c0000000144e4-11.dat UPX behavioral1/memory/2104-16-0x0000000008000000-0x000000000800E000-memory.dmp UPX behavioral1/memory/2756-18-0x0000000008000000-0x000000000800E000-memory.dmp UPX behavioral1/memory/2756-27-0x0000000008000000-0x000000000800E000-memory.dmp UPX -
Executes dropped EXE 1 IoCs
pid Process 2756 lossy.exe -
Loads dropped DLL 1 IoCs
pid Process 2104 690dd31781d5f10a049aaf9dc73ca5d52b9f9d6ef26377fc9e1d9aa5744f0b8b.exe -
resource yara_rule behavioral1/memory/2104-0-0x0000000008000000-0x000000000800E000-memory.dmp upx behavioral1/files/0x000c0000000144e4-11.dat upx behavioral1/memory/2104-16-0x0000000008000000-0x000000000800E000-memory.dmp upx behavioral1/memory/2756-18-0x0000000008000000-0x000000000800E000-memory.dmp upx behavioral1/memory/2756-27-0x0000000008000000-0x000000000800E000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2756 2104 690dd31781d5f10a049aaf9dc73ca5d52b9f9d6ef26377fc9e1d9aa5744f0b8b.exe 28 PID 2104 wrote to memory of 2756 2104 690dd31781d5f10a049aaf9dc73ca5d52b9f9d6ef26377fc9e1d9aa5744f0b8b.exe 28 PID 2104 wrote to memory of 2756 2104 690dd31781d5f10a049aaf9dc73ca5d52b9f9d6ef26377fc9e1d9aa5744f0b8b.exe 28 PID 2104 wrote to memory of 2756 2104 690dd31781d5f10a049aaf9dc73ca5d52b9f9d6ef26377fc9e1d9aa5744f0b8b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\690dd31781d5f10a049aaf9dc73ca5d52b9f9d6ef26377fc9e1d9aa5744f0b8b.exe"C:\Users\Admin\AppData\Local\Temp\690dd31781d5f10a049aaf9dc73ca5d52b9f9d6ef26377fc9e1d9aa5744f0b8b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\lossy.exe"C:\Users\Admin\AppData\Local\Temp\lossy.exe"2⤵
- Executes dropped EXE
PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5bdeca6ea5e1001c9757d0770bfe65137
SHA1f5cfc72dcc74d1e25a0a823e15ecae4966fa1a3f
SHA25670015b038a033e6ccf98d883978e7fe44b72a2fdd68578f96456abedde5fb9f2
SHA512c26afadc0f9dd8e77cae451780d21bf36769c83e07d86ac82b8d27040ea2c62c6bad412c28015f8a0c7a44396a27d8ab63602a4485ab6ae412c22f7a4359629e