Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 21:34
Behavioral task
behavioral1
Sample
2024-05-30_b005f9ff9539cc8f94d65740e0334a64_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-05-30_b005f9ff9539cc8f94d65740e0334a64_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-30_b005f9ff9539cc8f94d65740e0334a64_cryptolocker.exe
-
Size
24KB
-
MD5
b005f9ff9539cc8f94d65740e0334a64
-
SHA1
7bb45b69cf395f6d936a8c710caf5cabcae72319
-
SHA256
dee5cdd41a74346fc5df51ca96e8e1a0d2b3d8ad945e97739eff9b919667770d
-
SHA512
a9de15539002a891e1b0c43017f91cb87ff07eecdf4b8a423bfd288665d7a5d9287fdd1554851041f6dcba4f4760de17c1054ce548b4f3619a386f64fb8dbc39
-
SSDEEP
384:bVCPwFRuFn65arz1ZhdaXFXSCVQTLfjDp6HMmHBdaT:bVCPwFRo6CpwXFXSqQXfjAsmHBdG
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral1/memory/756-0-0x0000000008000000-0x000000000800E000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000b0000000149f5-11.dat CryptoLocker_rule2 behavioral1/memory/756-13-0x0000000002FA0000-0x0000000002FAE000-memory.dmp CryptoLocker_rule2 behavioral1/memory/756-17-0x0000000008000000-0x000000000800E000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2184-27-0x0000000008000000-0x000000000800E000-memory.dmp CryptoLocker_rule2 -
UPX dump on OEP (original entry point) 5 IoCs
resource yara_rule behavioral1/memory/756-0-0x0000000008000000-0x000000000800E000-memory.dmp UPX behavioral1/files/0x000b0000000149f5-11.dat UPX behavioral1/memory/756-13-0x0000000002FA0000-0x0000000002FAE000-memory.dmp UPX behavioral1/memory/756-17-0x0000000008000000-0x000000000800E000-memory.dmp UPX behavioral1/memory/2184-27-0x0000000008000000-0x000000000800E000-memory.dmp UPX -
Executes dropped EXE 1 IoCs
pid Process 2184 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 756 2024-05-30_b005f9ff9539cc8f94d65740e0334a64_cryptolocker.exe -
resource yara_rule behavioral1/memory/756-0-0x0000000008000000-0x000000000800E000-memory.dmp upx behavioral1/files/0x000b0000000149f5-11.dat upx behavioral1/memory/756-13-0x0000000002FA0000-0x0000000002FAE000-memory.dmp upx behavioral1/memory/756-17-0x0000000008000000-0x000000000800E000-memory.dmp upx behavioral1/memory/2184-27-0x0000000008000000-0x000000000800E000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 756 wrote to memory of 2184 756 2024-05-30_b005f9ff9539cc8f94d65740e0334a64_cryptolocker.exe 28 PID 756 wrote to memory of 2184 756 2024-05-30_b005f9ff9539cc8f94d65740e0334a64_cryptolocker.exe 28 PID 756 wrote to memory of 2184 756 2024-05-30_b005f9ff9539cc8f94d65740e0334a64_cryptolocker.exe 28 PID 756 wrote to memory of 2184 756 2024-05-30_b005f9ff9539cc8f94d65740e0334a64_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-30_b005f9ff9539cc8f94d65740e0334a64_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-30_b005f9ff9539cc8f94d65740e0334a64_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2184
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD5e1884340cd34e7a8d09d731a4784b4c2
SHA1a71810e5da609fe3c9d71b97db2c0fe1411599d6
SHA2565425b24e260d5825643d4ad332d7fb7ac46761b73313df7269f08df4e9af9da5
SHA5121a38175b377a4cb50c9ae7ba9dbbdbcb46a4066b8cb792b18329faf33f93e55b3609593da0f6b770df4153506cc59a81b6e0b7b5dc073c7a4672578d443400d2