Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09-01-2024 06:47
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-08_c1f40586dcae67790590e23ada9ad1ef_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-08_c1f40586dcae67790590e23ada9ad1ef_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-08_c1f40586dcae67790590e23ada9ad1ef_cryptolocker.exe
-
Size
37KB
-
MD5
c1f40586dcae67790590e23ada9ad1ef
-
SHA1
5b840fa377b11b6b0a1850d58557502bcaaa67a6
-
SHA256
bdac9df391aa16ff3a5672df1bc847c2d22e056703044d9a9a16f4c0fb5fa783
-
SHA512
91794fcfcda8f6635c96cd0e83d692cb714212d410570f969730b5f2a838dc89c63fbcbbf453b3f2d0ced18b4136a889208d135df28a19d6438702962198ba89
-
SSDEEP
768:UEEmoQDj/xnMp+yptndwe/PWQtOOtEvwDpjLenQLN:ZzFbxmLPWQMOtEvwDpjLeUN
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2372 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 828 2024-01-08_c1f40586dcae67790590e23ada9ad1ef_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 828 wrote to memory of 2372 828 2024-01-08_c1f40586dcae67790590e23ada9ad1ef_cryptolocker.exe 28 PID 828 wrote to memory of 2372 828 2024-01-08_c1f40586dcae67790590e23ada9ad1ef_cryptolocker.exe 28 PID 828 wrote to memory of 2372 828 2024-01-08_c1f40586dcae67790590e23ada9ad1ef_cryptolocker.exe 28 PID 828 wrote to memory of 2372 828 2024-01-08_c1f40586dcae67790590e23ada9ad1ef_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-08_c1f40586dcae67790590e23ada9ad1ef_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-08_c1f40586dcae67790590e23ada9ad1ef_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD56b8d37ab4bdc61e18f972509e1074817
SHA12d2b4117ea0f320161cd4f452965fabb43db03f3
SHA256f33697c4ec13ddc2c55fc0fbd5a23785001926c0b679ee3de01ebc8202791f17
SHA51265183e174691adcea845f76ad16308a92e1ad60d6ab96431a253d0d4d1b633cfb61a9f287c3ea09d6d161e49205a854045a0c47b3d94a9ea9134934cb36e4673