Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 07:25
Behavioral task
behavioral1
Sample
2024-05-25_44668428733990d30f7585383d067358_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-25_44668428733990d30f7585383d067358_cryptolocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-25_44668428733990d30f7585383d067358_cryptolocker.exe
-
Size
24KB
-
MD5
44668428733990d30f7585383d067358
-
SHA1
de5cd6c74344f02309dee2f5064b5217255c8523
-
SHA256
37cdedafe3ae4cc3e58a5b35f017c3fbf30a0b00d7a17329e5081757bac5b604
-
SHA512
66777ab11975edf3146831c4f519548337f0acb91adfef1595d09cbd3392c6beb445864b79cd34762554a9639e18b7c242cb4c4a57154906f80288dffa803eae
-
SSDEEP
384:bVCPwFRuFn65arz1ZhdaXFXSCVQTLfjDp6HMJw:bVCPwFRo6CpwXFXSqQXfjAsJw
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral1/memory/1224-0-0x0000000008000000-0x000000000800E000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x0009000000012280-11.dat CryptoLocker_rule2 behavioral1/memory/1224-15-0x0000000008000000-0x000000000800E000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2928-17-0x0000000008000000-0x000000000800E000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2928-26-0x0000000008000000-0x000000000800E000-memory.dmp CryptoLocker_rule2 -
UPX dump on OEP (original entry point) 5 IoCs
resource yara_rule behavioral1/memory/1224-0-0x0000000008000000-0x000000000800E000-memory.dmp UPX behavioral1/files/0x0009000000012280-11.dat UPX behavioral1/memory/1224-15-0x0000000008000000-0x000000000800E000-memory.dmp UPX behavioral1/memory/2928-17-0x0000000008000000-0x000000000800E000-memory.dmp UPX behavioral1/memory/2928-26-0x0000000008000000-0x000000000800E000-memory.dmp UPX -
Executes dropped EXE 1 IoCs
pid Process 2928 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 1224 2024-05-25_44668428733990d30f7585383d067358_cryptolocker.exe -
resource yara_rule behavioral1/memory/1224-0-0x0000000008000000-0x000000000800E000-memory.dmp upx behavioral1/files/0x0009000000012280-11.dat upx behavioral1/memory/1224-15-0x0000000008000000-0x000000000800E000-memory.dmp upx behavioral1/memory/2928-17-0x0000000008000000-0x000000000800E000-memory.dmp upx behavioral1/memory/2928-26-0x0000000008000000-0x000000000800E000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1224 wrote to memory of 2928 1224 2024-05-25_44668428733990d30f7585383d067358_cryptolocker.exe 28 PID 1224 wrote to memory of 2928 1224 2024-05-25_44668428733990d30f7585383d067358_cryptolocker.exe 28 PID 1224 wrote to memory of 2928 1224 2024-05-25_44668428733990d30f7585383d067358_cryptolocker.exe 28 PID 1224 wrote to memory of 2928 1224 2024-05-25_44668428733990d30f7585383d067358_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_44668428733990d30f7585383d067358_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-25_44668428733990d30f7585383d067358_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD5163b71de540b7d5dbf22ebe1924836ed
SHA186bfe1e6339290bc892a8965509fc5414bfd12c4
SHA2566acb0c6117604d772e0117c487dd0b77b647bdc3b754ad9e50e56a09364e4a24
SHA5125525af530543a364c3dc68e1e24df454c230559e229709b2af58d8bcf6cf317209e9f0fd2c7d14e2ad6d5d13db708e5a2d227a6106e299ff6c76d96ee02866d1