Analysis
-
max time kernel
150s -
max time network
162s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
05/01/2024, 05:50
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-01_c208962bda71c15eddeb577746346d3f_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-01_c208962bda71c15eddeb577746346d3f_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-01_c208962bda71c15eddeb577746346d3f_cryptolocker.exe
-
Size
58KB
-
MD5
c208962bda71c15eddeb577746346d3f
-
SHA1
040f00b536e78a597f9a6af61d83714d6ad755e4
-
SHA256
aa1aed60565659c04fa4b04c3019af7f3e7e7e894dbb1cdc51de8577b424b8de
-
SHA512
8b74721429b4d8043660dd3bd468bb4a57771c80ab451c0c9f8470aa9296c08a9cc1ade6fd7fd6c38bf84603c7eb2f8607bbb41cf147b962456f6e3acae96334
-
SSDEEP
1536:Tj+jsMQMOtEvwDpj5HmpJpOUHECgNMo0vp2EMT7P:TCjsIOtEvwDpj5HE/OUHnSMo
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2552 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1640 2024-01-01_c208962bda71c15eddeb577746346d3f_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2552 1640 2024-01-01_c208962bda71c15eddeb577746346d3f_cryptolocker.exe 28 PID 1640 wrote to memory of 2552 1640 2024-01-01_c208962bda71c15eddeb577746346d3f_cryptolocker.exe 28 PID 1640 wrote to memory of 2552 1640 2024-01-01_c208962bda71c15eddeb577746346d3f_cryptolocker.exe 28 PID 1640 wrote to memory of 2552 1640 2024-01-01_c208962bda71c15eddeb577746346d3f_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-01_c208962bda71c15eddeb577746346d3f_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-01_c208962bda71c15eddeb577746346d3f_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD5a678d617ac7cfa937faf78e73859e74a
SHA1ee57264b5696a75afdc54e133aa865f053a3b643
SHA256d54b2a3bd8d147a3533ef3b20645147d4c1ba4cfede6196c5c555a98a7e64e8a
SHA512b18c555358c996176deca251ed73e5eeecf7982c9decfcc2dff69a42bb302a777b4345745b2a176a92a435cb58e196009257a5e78c118c6d10828e591fbfb40d