Analysis
-
max time kernel
0s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
05-01-2024 05:46
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-01_948239831638734355cc4a47e870899e_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-01_948239831638734355cc4a47e870899e_cryptolocker.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-01_948239831638734355cc4a47e870899e_cryptolocker.exe
-
Size
36KB
-
MD5
948239831638734355cc4a47e870899e
-
SHA1
ef4beb18af2189a37cf1deea6534a3594501af19
-
SHA256
2594165ae89d47e12d0065402bcb4c0e0039c1625b27c244d4c0c012f9131016
-
SHA512
99955c031869cfff97b8d408c6886ba0b74d4818108c1b3ca2f1b607125c2f56f17a32ec77ebefcc7805a8918d721e945e97de522cbc7dbee58481ed49f125d3
-
SSDEEP
768:TS5nQJ24LR7tOOtEvwDpjGqPhqlcnv0Vei:m5nkFNMOtEvwDpjG8h0Qi
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2756 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2148 2024-01-01_948239831638734355cc4a47e870899e_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2756 2148 2024-01-01_948239831638734355cc4a47e870899e_cryptolocker.exe 14 PID 2148 wrote to memory of 2756 2148 2024-01-01_948239831638734355cc4a47e870899e_cryptolocker.exe 14 PID 2148 wrote to memory of 2756 2148 2024-01-01_948239831638734355cc4a47e870899e_cryptolocker.exe 14 PID 2148 wrote to memory of 2756 2148 2024-01-01_948239831638734355cc4a47e870899e_cryptolocker.exe 14
Processes
-
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"1⤵
- Executes dropped EXE
PID:2756
-
C:\Users\Admin\AppData\Local\Temp\2024-01-01_948239831638734355cc4a47e870899e_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-01_948239831638734355cc4a47e870899e_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD5af5ec7198ba59d2e12ce45851cdadf6b
SHA1b313de88b0eb6db33897358ef81ce43a9a96609b
SHA256739d8ea8027857a562ab5450d096661cc286423507a18bbdcf36f6967024844c
SHA5129ed0cf0aed58025b3658f88193d5ce7963428ccc64108df1c037482687297036b5ac35814fd1ff0bc39d3f0826511c1a5e390080a7f02336ada29de8dc736ff3
-
Filesize
2KB
MD51ee0af626db382b442b4f38470720294
SHA11fc81505776d5249edf778b72a227b136ec83573
SHA256a4f944f7404a36afd6d39aaa02e11f1567e0d5c49b37a98ad23dc4202e3fdc6e
SHA51220e7e2cb33070bc503196401b6938ab8619357b166a560d7a89d87dd16a6b7a29558e55f6537864a2f3c155cd40f1215e5a5c8f8869cd3fdbff062e5f0a0fb29
-
Filesize
25KB
MD595302f929c6592654eab452ce68774e3
SHA1d3910ab73c818f8321a06c9f62d052f05bf9c428
SHA256744920ddabb8cf52c9ace6698a3dab5120b19a95233baf7f56bace250858cd93
SHA512af6094a7d9430ab5e34c1632c51f895a4a5ad84dc24a3f9abc27c85940de3387ab602902b8cc9786d0b78238ce545a618a6628e5ecc34fd120fc97cd9d7fd2f6