Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15/06/2024, 15:23
Behavioral task
behavioral1
Sample
2024-06-15_205d32ee2f1a849f4539f2ed0347681f_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-15_205d32ee2f1a849f4539f2ed0347681f_cryptolocker.exe
Resource
win10v2004-20240611-en
General
-
Target
2024-06-15_205d32ee2f1a849f4539f2ed0347681f_cryptolocker.exe
-
Size
86KB
-
MD5
205d32ee2f1a849f4539f2ed0347681f
-
SHA1
4768b547e781f80ffb86852b1e0bc6d97b880792
-
SHA256
dfa9fc35cb1003b85805c0187b7d1e80aa80cb1ae9c454d4be79bf08055251c6
-
SHA512
835b4fbf03bc800941290547d1657a3bd3d3ccb1a4c926f52921683479930d7f7498bd0606e8899df8dfe349f0ab6ac25e6c02e81b9d2fe10d899fc50fa6d168
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyJS1a:zCsanOtEvwDpjk
Malware Config
Signatures
-
Detection of CryptoLocker Variants 4 IoCs
resource yara_rule behavioral1/memory/2156-0-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000c000000012286-11.dat CryptoLocker_rule2 behavioral1/memory/2156-14-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2080-25-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 4 IoCs
resource yara_rule behavioral1/memory/2156-0-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 behavioral1/files/0x000c000000012286-11.dat CryptoLocker_set1 behavioral1/memory/2156-14-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 behavioral1/memory/2080-25-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 -
UPX dump on OEP (original entry point) 4 IoCs
resource yara_rule behavioral1/memory/2156-0-0x0000000000500000-0x0000000000510000-memory.dmp UPX behavioral1/files/0x000c000000012286-11.dat UPX behavioral1/memory/2156-14-0x0000000000500000-0x0000000000510000-memory.dmp UPX behavioral1/memory/2080-25-0x0000000000500000-0x0000000000510000-memory.dmp UPX -
Executes dropped EXE 1 IoCs
pid Process 2080 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2156 2024-06-15_205d32ee2f1a849f4539f2ed0347681f_cryptolocker.exe -
resource yara_rule behavioral1/memory/2156-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x000c000000012286-11.dat upx behavioral1/memory/2156-14-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2080-25-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2080 2156 2024-06-15_205d32ee2f1a849f4539f2ed0347681f_cryptolocker.exe 28 PID 2156 wrote to memory of 2080 2156 2024-06-15_205d32ee2f1a849f4539f2ed0347681f_cryptolocker.exe 28 PID 2156 wrote to memory of 2080 2156 2024-06-15_205d32ee2f1a849f4539f2ed0347681f_cryptolocker.exe 28 PID 2156 wrote to memory of 2080 2156 2024-06-15_205d32ee2f1a849f4539f2ed0347681f_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-15_205d32ee2f1a849f4539f2ed0347681f_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-15_205d32ee2f1a849f4539f2ed0347681f_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD5048dd8e36609eb1844589a801ab84bf0
SHA1cfb561caeca4ae1de75fd044d6d057eddac3332f
SHA256abd6adb75775b8811b5013caf1b4d99dd11714d411766a1cd6bcf7767bf93d8d
SHA5125fa57aac004b2e3843a3a71b7b24ff281fe1ec929566d89779558327204fb3a4b711723084f8a5962a164b1033be2c6e21bff932823cb215114a85666e8278f8