Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 12:15
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-06_b6fb8783fe4ffa20e0e574604b7cd8df_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-06_b6fb8783fe4ffa20e0e574604b7cd8df_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-06_b6fb8783fe4ffa20e0e574604b7cd8df_cryptolocker.exe
-
Size
60KB
-
MD5
b6fb8783fe4ffa20e0e574604b7cd8df
-
SHA1
9ff0be0d95c1885a9cad842aa8691c7f2a4dabe9
-
SHA256
c36758d98ada5f3d44d8eac634478a1878cee228e7f65089289d32abdd36223d
-
SHA512
9f86222f304d5741aca3d9f576284ddd3c39dc3c2aecb66803dcd93f53f1baf44a5cf680273dd1c5937f346a6a81887434f253344a6fee5029361f64a27a2338
-
SSDEEP
768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqPOYRmNxt5I52kGElUAl:6j+1NMOtEvwDpjr8ox8UDElbl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2556 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2848 2024-01-06_b6fb8783fe4ffa20e0e574604b7cd8df_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2556 2848 2024-01-06_b6fb8783fe4ffa20e0e574604b7cd8df_cryptolocker.exe 16 PID 2848 wrote to memory of 2556 2848 2024-01-06_b6fb8783fe4ffa20e0e574604b7cd8df_cryptolocker.exe 16 PID 2848 wrote to memory of 2556 2848 2024-01-06_b6fb8783fe4ffa20e0e574604b7cd8df_cryptolocker.exe 16 PID 2848 wrote to memory of 2556 2848 2024-01-06_b6fb8783fe4ffa20e0e574604b7cd8df_cryptolocker.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-06_b6fb8783fe4ffa20e0e574604b7cd8df_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-06_b6fb8783fe4ffa20e0e574604b7cd8df_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2556
-