Analysis
-
max time kernel
184s -
max time network
190s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 06:41
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-08_5c8269ed98a537b647a9f9dfd5852249_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-08_5c8269ed98a537b647a9f9dfd5852249_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-08_5c8269ed98a537b647a9f9dfd5852249_cryptolocker.exe
-
Size
63KB
-
MD5
5c8269ed98a537b647a9f9dfd5852249
-
SHA1
e419333960fafa086cc399d6f8ad8e655195795b
-
SHA256
52a5fed283b34f54478b339887f3041631030841a3851bb6cd63033c19a13a12
-
SHA512
a89bbb8522d8ea3eb32d85aa7fd2a83c25eed81b57d970fc93922dc9e4c3dfd973ba8fa01eecc45993f6fbaa5028bfa6921fdc67608ddbf68b8f457aa0bb4991
-
SSDEEP
1536:ZzFbxmLPWQMOtEvwDpj386Sj/WprgJN6tZdOyJ3hvLcbVw:ZVxkGOtEvwDpjcawG
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2800 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2792 2024-01-08_5c8269ed98a537b647a9f9dfd5852249_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2800 2792 2024-01-08_5c8269ed98a537b647a9f9dfd5852249_cryptolocker.exe 27 PID 2792 wrote to memory of 2800 2792 2024-01-08_5c8269ed98a537b647a9f9dfd5852249_cryptolocker.exe 27 PID 2792 wrote to memory of 2800 2792 2024-01-08_5c8269ed98a537b647a9f9dfd5852249_cryptolocker.exe 27 PID 2792 wrote to memory of 2800 2792 2024-01-08_5c8269ed98a537b647a9f9dfd5852249_cryptolocker.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-08_5c8269ed98a537b647a9f9dfd5852249_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-08_5c8269ed98a537b647a9f9dfd5852249_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD59b7dd47c3c624a752666f43e66454265
SHA16f17c137549b4adc5272381ac28bafc829a7fc03
SHA25662e5d0489813f84b2599c5a9a9c2664f4cf281a03eaa79311707af381f94ee23
SHA51260133d90137e9c2ebadff0f0cbc3be1979bc7e1a60f7dfdb127f67740e0c0f2cbc805c80eccf52bef676a64cf4d3120a89c1d43aa914a7e7c313bdf5cebe15ec