Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 02:39
Behavioral task
behavioral1
Sample
2024-05-31_4a75e445eb3272684af5b1d30b531f41_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-31_4a75e445eb3272684af5b1d30b531f41_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-31_4a75e445eb3272684af5b1d30b531f41_cryptolocker.exe
-
Size
95KB
-
MD5
4a75e445eb3272684af5b1d30b531f41
-
SHA1
c32180b9f3d01513db23f4727b2aa76f9faff268
-
SHA256
beda07e7dbad6cf11324c190bf94480105101d9edfe515319d931b818a7e140e
-
SHA512
6d4a2302c3f9863a3d8488d8010404fd88c04bd3aec068e475d67faa1fbf0866f651cf73195bb65903b0e3e872915000006c95076817f1c4cf5e33b636e07354
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp0+h:AnBdOOtEvwDpj6ze
Malware Config
Signatures
-
Detection of CryptoLocker Variants 4 IoCs
resource yara_rule behavioral1/memory/2420-0-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000f00000001214d-11.dat CryptoLocker_rule2 behavioral1/memory/2420-16-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2376-26-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 4 IoCs
resource yara_rule behavioral1/memory/2420-0-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral1/files/0x000f00000001214d-11.dat CryptoLocker_set1 behavioral1/memory/2420-16-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral1/memory/2376-26-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 -
UPX dump on OEP (original entry point) 4 IoCs
resource yara_rule behavioral1/memory/2420-0-0x0000000000500000-0x000000000050F000-memory.dmp UPX behavioral1/files/0x000f00000001214d-11.dat UPX behavioral1/memory/2420-16-0x0000000000500000-0x000000000050F000-memory.dmp UPX behavioral1/memory/2376-26-0x0000000000500000-0x000000000050F000-memory.dmp UPX -
Executes dropped EXE 1 IoCs
pid Process 2376 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2420 2024-05-31_4a75e445eb3272684af5b1d30b531f41_cryptolocker.exe -
resource yara_rule behavioral1/memory/2420-0-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/files/0x000f00000001214d-11.dat upx behavioral1/memory/2420-16-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/memory/2376-26-0x0000000000500000-0x000000000050F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2376 2420 2024-05-31_4a75e445eb3272684af5b1d30b531f41_cryptolocker.exe 28 PID 2420 wrote to memory of 2376 2420 2024-05-31_4a75e445eb3272684af5b1d30b531f41_cryptolocker.exe 28 PID 2420 wrote to memory of 2376 2420 2024-05-31_4a75e445eb3272684af5b1d30b531f41_cryptolocker.exe 28 PID 2420 wrote to memory of 2376 2420 2024-05-31_4a75e445eb3272684af5b1d30b531f41_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-31_4a75e445eb3272684af5b1d30b531f41_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-31_4a75e445eb3272684af5b1d30b531f41_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD51274225dbf5ea09ea84d50537045dcfa
SHA1bd32e872cbc4a5633413eb8815ab718335bcde8c
SHA256ca685228240a1bb2deb43ccdcc3387b2f44b383d04740f7b3394aa5c1eb08c2d
SHA5129906266a6a974cb8ef96dda7fdc452b17406b470ef684f735fe0d16329f841bc808fa61d64835fd3f3ea2448f7caa62b2cd9f1b1adb94e2fd00374eb69fe53bc