Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 15:24
Behavioral task
behavioral1
Sample
2024-05-28_15364b4dd84ca092d85c4046cc5e2505_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-28_15364b4dd84ca092d85c4046cc5e2505_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-28_15364b4dd84ca092d85c4046cc5e2505_cryptolocker.exe
-
Size
24KB
-
MD5
15364b4dd84ca092d85c4046cc5e2505
-
SHA1
e4c09d49535bb40728787df5413541084d63986f
-
SHA256
a4ef9649d72f17e270a6036591789ecd12ca57838a9a7974721d422f697d5e5a
-
SHA512
e84b334c6f9dd278a8b4253649905a6ad053b59c743b35e28bdb02383f1c886e54d803dd76c94d1b25751e89eb2e64c21ad77cb0af5240349d22abf617c98b39
-
SSDEEP
384:bVCPwFRuFn65arz1ZhdaXFXSCVQTLfjDp6HMJ2m:bVCPwFRo6CpwXFXSqQXfjAsJJ
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral1/memory/2216-0-0x0000000008000000-0x000000000800E000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000c00000001227b-11.dat CryptoLocker_rule2 behavioral1/memory/1908-17-0x0000000008000000-0x000000000800E000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2216-16-0x0000000008000000-0x000000000800E000-memory.dmp CryptoLocker_rule2 behavioral1/memory/1908-27-0x0000000008000000-0x000000000800E000-memory.dmp CryptoLocker_rule2 -
UPX dump on OEP (original entry point) 5 IoCs
resource yara_rule behavioral1/memory/2216-0-0x0000000008000000-0x000000000800E000-memory.dmp UPX behavioral1/files/0x000c00000001227b-11.dat UPX behavioral1/memory/1908-17-0x0000000008000000-0x000000000800E000-memory.dmp UPX behavioral1/memory/2216-16-0x0000000008000000-0x000000000800E000-memory.dmp UPX behavioral1/memory/1908-27-0x0000000008000000-0x000000000800E000-memory.dmp UPX -
Executes dropped EXE 1 IoCs
pid Process 1908 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 2216 2024-05-28_15364b4dd84ca092d85c4046cc5e2505_cryptolocker.exe -
resource yara_rule behavioral1/memory/2216-0-0x0000000008000000-0x000000000800E000-memory.dmp upx behavioral1/files/0x000c00000001227b-11.dat upx behavioral1/memory/1908-17-0x0000000008000000-0x000000000800E000-memory.dmp upx behavioral1/memory/2216-16-0x0000000008000000-0x000000000800E000-memory.dmp upx behavioral1/memory/1908-27-0x0000000008000000-0x000000000800E000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2216 wrote to memory of 1908 2216 2024-05-28_15364b4dd84ca092d85c4046cc5e2505_cryptolocker.exe 28 PID 2216 wrote to memory of 1908 2216 2024-05-28_15364b4dd84ca092d85c4046cc5e2505_cryptolocker.exe 28 PID 2216 wrote to memory of 1908 2216 2024-05-28_15364b4dd84ca092d85c4046cc5e2505_cryptolocker.exe 28 PID 2216 wrote to memory of 1908 2216 2024-05-28_15364b4dd84ca092d85c4046cc5e2505_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_15364b4dd84ca092d85c4046cc5e2505_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-28_15364b4dd84ca092d85c4046cc5e2505_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:1908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD57d76ed91bca784548f0699d939a424ff
SHA163bf0fab30fb5ec75cc1f7500763a958ab310c4f
SHA2560153f1c7dee1e1395054ba83deb33834859009a9dfc7befdad47b89a190f4533
SHA512e19cc3dfde22b2410b33b7856e4596b15d0ad2c8dfaef79cf9a07ef299a66143549a8d415b00b7b7fba1243bcecc47087c3b22540ce5f0f4f4c18a10dcb21e95