Analysis
-
max time kernel
151s -
max time network
195s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 18:39
Static task
static1
Behavioral task
behavioral1
Sample
2022-11-23_97302eada3f130412e4a00c771f6dc44_cryptolocker.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2022-11-23_97302eada3f130412e4a00c771f6dc44_cryptolocker.exe
Resource
win10v2004-20221111-en
General
-
Target
2022-11-23_97302eada3f130412e4a00c771f6dc44_cryptolocker.exe
-
Size
44KB
-
MD5
97302eada3f130412e4a00c771f6dc44
-
SHA1
6003d9f4dcbf3d82e3d3fe813d0e1952bce414f9
-
SHA256
f1c36919c8f20bc80d3538fd30808d8fa80768577e4d41575728d31a7480bb69
-
SHA512
602ce7bd4d93e2f0e0d382021be5860138ce1d5a9f4a7b7dc3b05e1257a2e724714a1b6eb185120170cb04d6627461d0e3218e5d7b14a37aa9ccb10c7b0c0529
-
SSDEEP
768:UEEmoQDj/xnMp+yptndwe/PWQtOOtEvwDpjIm8lB4dCOBy/cMcls6z:ZzFbxmLPWQMOtEvwDpj38lD/cMUs0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
misid.exepid process 1920 misid.exe -
Loads dropped DLL 1 IoCs
Processes:
2022-11-23_97302eada3f130412e4a00c771f6dc44_cryptolocker.exepid process 1812 2022-11-23_97302eada3f130412e4a00c771f6dc44_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
2022-11-23_97302eada3f130412e4a00c771f6dc44_cryptolocker.exedescription pid process target process PID 1812 wrote to memory of 1920 1812 2022-11-23_97302eada3f130412e4a00c771f6dc44_cryptolocker.exe misid.exe PID 1812 wrote to memory of 1920 1812 2022-11-23_97302eada3f130412e4a00c771f6dc44_cryptolocker.exe misid.exe PID 1812 wrote to memory of 1920 1812 2022-11-23_97302eada3f130412e4a00c771f6dc44_cryptolocker.exe misid.exe PID 1812 wrote to memory of 1920 1812 2022-11-23_97302eada3f130412e4a00c771f6dc44_cryptolocker.exe misid.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2022-11-23_97302eada3f130412e4a00c771f6dc44_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2022-11-23_97302eada3f130412e4a00c771f6dc44_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:1920
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD53598a3139d6a2cb0005946f7aee11f67
SHA1f3887e1444f06539427183fb74444cb270dee965
SHA256033324006d82408497e2287b159aca48c542be626abc9fb4f59a6cb284e775a5
SHA512b02b22f45a5799e8933fcb4549c5ebe00e7fbd4875ba4307fd69f70387873b63a41dcdd84d401d6e19bd78d75db36f7c63c1d4d9f8f42cc2130aad748645b3f1
-
Filesize
44KB
MD53598a3139d6a2cb0005946f7aee11f67
SHA1f3887e1444f06539427183fb74444cb270dee965
SHA256033324006d82408497e2287b159aca48c542be626abc9fb4f59a6cb284e775a5
SHA512b02b22f45a5799e8933fcb4549c5ebe00e7fbd4875ba4307fd69f70387873b63a41dcdd84d401d6e19bd78d75db36f7c63c1d4d9f8f42cc2130aad748645b3f1
-
Filesize
44KB
MD53598a3139d6a2cb0005946f7aee11f67
SHA1f3887e1444f06539427183fb74444cb270dee965
SHA256033324006d82408497e2287b159aca48c542be626abc9fb4f59a6cb284e775a5
SHA512b02b22f45a5799e8933fcb4549c5ebe00e7fbd4875ba4307fd69f70387873b63a41dcdd84d401d6e19bd78d75db36f7c63c1d4d9f8f42cc2130aad748645b3f1