Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 19:14
Behavioral task
behavioral1
Sample
2024-05-27_68987630c1fdde11369a6430b7bafa26_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-27_68987630c1fdde11369a6430b7bafa26_cryptolocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-27_68987630c1fdde11369a6430b7bafa26_cryptolocker.exe
-
Size
40KB
-
MD5
68987630c1fdde11369a6430b7bafa26
-
SHA1
3c7c71948758df3f647c1766cf11e1f294e008bd
-
SHA256
37518f01add800ce964b3525b3a7b0ef4523eb51faf6a1b1c6a6e21b0bf2ef46
-
SHA512
4e6ee726e929d05da4844db1ef8970a0fd2765110be9a65b4fe24a9c38ad24588e29b51ebaab488dae1e314a1ad3c76c5324dee6a87223e799f27fa1fde85912
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaB3:qDdFJy3QMOtEvwDpjjWMl7Tdh
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral1/memory/1720-0-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000b000000014aec-11.dat CryptoLocker_rule2 behavioral1/memory/1720-12-0x0000000001F70000-0x0000000001F80000-memory.dmp CryptoLocker_rule2 behavioral1/memory/1720-17-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2220-27-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 5 IoCs
resource yara_rule behavioral1/memory/1720-0-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 behavioral1/files/0x000b000000014aec-11.dat CryptoLocker_set1 behavioral1/memory/1720-12-0x0000000001F70000-0x0000000001F80000-memory.dmp CryptoLocker_set1 behavioral1/memory/1720-17-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 behavioral1/memory/2220-27-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 -
UPX dump on OEP (original entry point) 5 IoCs
resource yara_rule behavioral1/memory/1720-0-0x0000000000500000-0x0000000000510000-memory.dmp UPX behavioral1/files/0x000b000000014aec-11.dat UPX behavioral1/memory/1720-12-0x0000000001F70000-0x0000000001F80000-memory.dmp UPX behavioral1/memory/1720-17-0x0000000000500000-0x0000000000510000-memory.dmp UPX behavioral1/memory/2220-27-0x0000000000500000-0x0000000000510000-memory.dmp UPX -
Executes dropped EXE 1 IoCs
pid Process 2220 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1720 2024-05-27_68987630c1fdde11369a6430b7bafa26_cryptolocker.exe -
resource yara_rule behavioral1/memory/1720-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x000b000000014aec-11.dat upx behavioral1/memory/1720-12-0x0000000001F70000-0x0000000001F80000-memory.dmp upx behavioral1/memory/1720-17-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2220-27-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2220 1720 2024-05-27_68987630c1fdde11369a6430b7bafa26_cryptolocker.exe 28 PID 1720 wrote to memory of 2220 1720 2024-05-27_68987630c1fdde11369a6430b7bafa26_cryptolocker.exe 28 PID 1720 wrote to memory of 2220 1720 2024-05-27_68987630c1fdde11369a6430b7bafa26_cryptolocker.exe 28 PID 1720 wrote to memory of 2220 1720 2024-05-27_68987630c1fdde11369a6430b7bafa26_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-27_68987630c1fdde11369a6430b7bafa26_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-27_68987630c1fdde11369a6430b7bafa26_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2220
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD52b1cadf68e05b3327f3af4130612a94c
SHA1c72a6bbd9800ea6428143cedd35b7c981395e79a
SHA2567303c9a5ba3f201481551fd0f7137ff4c0909738162498e205d74ac6fb23448b
SHA51258fdabccfb066f4228cb270854a7f8f4fd1d4849fa08dd1d3307eebfe2154252fd752ba8701ac5c4fc6ac58fdede263e0503c66c69009311b0b3f5460e94dac1