Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 04:12
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-24_f0b7e0fca7ee36b5ed8245e1bc283218_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-24_f0b7e0fca7ee36b5ed8245e1bc283218_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-24_f0b7e0fca7ee36b5ed8245e1bc283218_cryptolocker.exe
-
Size
65KB
-
MD5
f0b7e0fca7ee36b5ed8245e1bc283218
-
SHA1
f6db6b53b8a965a79389332cad576e70df884ae3
-
SHA256
ff07908e76d9d6921aabb1ea7e0b07c70552b75baf748cb2934e27d2de6b4bf5
-
SHA512
5952186ec097bb3187d531ec64b496b4923382a25e29ef277133ac2d39b880bf9558bf0af1d84ce943e7b15ac9627db8aa010c9e10c1fdb05c1f598987b2b7d0
-
SSDEEP
1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsij+:BbdDmjr+OtEvwDpjM8P
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral1/memory/2440-0-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000b000000012250-11.dat CryptoLocker_rule2 behavioral1/memory/2440-16-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2504-17-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2504-27-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 2 IoCs
resource yara_rule behavioral1/memory/2440-16-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 behavioral1/memory/2504-27-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 -
UPX dump on OEP (original entry point) 5 IoCs
resource yara_rule behavioral1/memory/2440-0-0x0000000000500000-0x0000000000510000-memory.dmp UPX behavioral1/files/0x000b000000012250-11.dat UPX behavioral1/memory/2440-16-0x0000000000500000-0x0000000000510000-memory.dmp UPX behavioral1/memory/2504-17-0x0000000000500000-0x0000000000510000-memory.dmp UPX behavioral1/memory/2504-27-0x0000000000500000-0x0000000000510000-memory.dmp UPX -
Executes dropped EXE 1 IoCs
pid Process 2504 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2440 2024-05-24_f0b7e0fca7ee36b5ed8245e1bc283218_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2504 2440 2024-05-24_f0b7e0fca7ee36b5ed8245e1bc283218_cryptolocker.exe 28 PID 2440 wrote to memory of 2504 2440 2024-05-24_f0b7e0fca7ee36b5ed8245e1bc283218_cryptolocker.exe 28 PID 2440 wrote to memory of 2504 2440 2024-05-24_f0b7e0fca7ee36b5ed8245e1bc283218_cryptolocker.exe 28 PID 2440 wrote to memory of 2504 2440 2024-05-24_f0b7e0fca7ee36b5ed8245e1bc283218_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_f0b7e0fca7ee36b5ed8245e1bc283218_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-24_f0b7e0fca7ee36b5ed8245e1bc283218_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD51d6d325cf239c65ce66599d95abce9e1
SHA1207f0911cb833f5fb7bcdd2b616c9acee0cc794b
SHA2568149d5ebddc390d5422a4c56328c320f0afdcb93a54b197f202a86fd52542134
SHA5121b234ea79b309353cdffc6fd481c427f1e528d5b05cfeb2e5bae70b79172f335dca32d671617550a4932a16a9aaf694b7a71a9567ebd8413269e160fdaf4f502