Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 03:46
Behavioral task
behavioral1
Sample
2024-05-28_83b41586382fed35caeac89328eedf5b_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-05-28_83b41586382fed35caeac89328eedf5b_cryptolocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-28_83b41586382fed35caeac89328eedf5b_cryptolocker.exe
-
Size
53KB
-
MD5
83b41586382fed35caeac89328eedf5b
-
SHA1
7003171a4f7c7fca9f8f1c7d01cf535e6ab90ecd
-
SHA256
c3143fb1fa605641a0dddef52b7febb11e8285d3802a02a8fdfe45577970c8a5
-
SHA512
8632dea41556490dea921d852e16e76e5e58d4f2fa4a78395724128a5e69631ab9ffadf27b89b67e7c9c03bf2dbf67410dfa31b7b153c759047cda5813c83f3f
-
SSDEEP
768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YY1J+OTOkgt:z6QFElP6n+gKmddpMOtEvwDpj31ikgt
Malware Config
Signatures
-
Detection of CryptoLocker Variants 4 IoCs
resource yara_rule behavioral1/memory/1636-0-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000c000000015cb1-11.dat CryptoLocker_rule2 behavioral1/memory/1636-15-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral1/memory/3048-25-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 4 IoCs
resource yara_rule behavioral1/memory/1636-0-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 behavioral1/files/0x000c000000015cb1-11.dat CryptoLocker_set1 behavioral1/memory/1636-15-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 behavioral1/memory/3048-25-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 -
UPX dump on OEP (original entry point) 4 IoCs
resource yara_rule behavioral1/memory/1636-0-0x0000000000500000-0x0000000000510000-memory.dmp UPX behavioral1/files/0x000c000000015cb1-11.dat UPX behavioral1/memory/1636-15-0x0000000000500000-0x0000000000510000-memory.dmp UPX behavioral1/memory/3048-25-0x0000000000500000-0x0000000000510000-memory.dmp UPX -
Executes dropped EXE 1 IoCs
pid Process 3048 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1636 2024-05-28_83b41586382fed35caeac89328eedf5b_cryptolocker.exe -
resource yara_rule behavioral1/memory/1636-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x000c000000015cb1-11.dat upx behavioral1/memory/1636-15-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/3048-25-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1636 wrote to memory of 3048 1636 2024-05-28_83b41586382fed35caeac89328eedf5b_cryptolocker.exe 28 PID 1636 wrote to memory of 3048 1636 2024-05-28_83b41586382fed35caeac89328eedf5b_cryptolocker.exe 28 PID 1636 wrote to memory of 3048 1636 2024-05-28_83b41586382fed35caeac89328eedf5b_cryptolocker.exe 28 PID 1636 wrote to memory of 3048 1636 2024-05-28_83b41586382fed35caeac89328eedf5b_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_83b41586382fed35caeac89328eedf5b_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-28_83b41586382fed35caeac89328eedf5b_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:3048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD57b999b2da0dc6498f50637b8b52e7b2f
SHA1fb8b04da532cc3b3836e0f0e5ee1507093191ad8
SHA256e8dab11b9e8153fa9220156a6ac6862d8a78a37ff0d7f4e448005bf827233b90
SHA512dfaf9de7e6a8eac70166a59138bf9bec04be37035513a90829017695b03325c850df74abdbcaae40d09a127dab22335ddae4082cd82888a8bbf8812d4f9c6493