Analysis
-
max time kernel
0s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 06:48
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-08_cc5bfd300ae306af3504c1d7a8ddd1e0_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-08_cc5bfd300ae306af3504c1d7a8ddd1e0_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-08_cc5bfd300ae306af3504c1d7a8ddd1e0_cryptolocker.exe
-
Size
98KB
-
MD5
cc5bfd300ae306af3504c1d7a8ddd1e0
-
SHA1
b2d0759e69124501d24bae2094b4578421209d42
-
SHA256
dfe888298a125bea09a3d2346780ec10e0cf74c4ef8f9cc762639a6f7c0a082f
-
SHA512
945610963066951978d1206d98e026ceb9530081701bbbb71025b2e0d8c17f434102ab29dc9caa8adaa5fc5e78afabb04271b90089f77319fc21672668c82a71
-
SSDEEP
768:XS5nQJ24LR1bytOOtEvwDpjNbZ7uyA36S7MpxRiWjzbJ:i5nkFGMOtEvwDpjNbwQEIikZ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3008 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2652 2024-01-08_cc5bfd300ae306af3504c1d7a8ddd1e0_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2652 wrote to memory of 3008 2652 2024-01-08_cc5bfd300ae306af3504c1d7a8ddd1e0_cryptolocker.exe 14 PID 2652 wrote to memory of 3008 2652 2024-01-08_cc5bfd300ae306af3504c1d7a8ddd1e0_cryptolocker.exe 14 PID 2652 wrote to memory of 3008 2652 2024-01-08_cc5bfd300ae306af3504c1d7a8ddd1e0_cryptolocker.exe 14 PID 2652 wrote to memory of 3008 2652 2024-01-08_cc5bfd300ae306af3504c1d7a8ddd1e0_cryptolocker.exe 14
Processes
-
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"1⤵
- Executes dropped EXE
PID:3008
-
C:\Users\Admin\AppData\Local\Temp\2024-01-08_cc5bfd300ae306af3504c1d7a8ddd1e0_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-08_cc5bfd300ae306af3504c1d7a8ddd1e0_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98KB
MD5c3c360901469ac879cc157b96e083985
SHA1b0ddde720725c3f45a06536c72355c3386829330
SHA2568bf598495877015e5122b22258314cc5b0681dd12d618ca7d7f43afdbf81f030
SHA512a1296ab7176381f0d813ba0fb5542f1d8e44a6ae67000aeb1bcc1a348c34e84b12b9ed5c1af29e893b228e1704e57420acdfd1a38858a7248b3da056378ad151
-
Filesize
31KB
MD55387675149e76784db95ca8599e615b3
SHA1a500f7a99f69ff88b3f26a4a30456ac1a3ae7193
SHA2560c4fe16ab6a595e0a6248be3e15e4b8e57798110fcf011fd47236d1b9041b3f5
SHA512490a18f13c5a86fbcea4cb5e7824b94904a2e38fcad4d55003f3703465945d4e71d8bef4814276ad0fbc98384319376b885266b91a1e670c0c4575d204bbb7dc
-
Filesize
15KB
MD5e9fc630e706d89fd54acfc49c7fbf89e
SHA1044a98ef86f2f232d00bf1818c8193e0438fae14
SHA2565d6401d3e058ddb66189ec69f6eb3471d915a5f6f075912b9f8d1cb2384da580
SHA51216fac9426c0c3290c72241896fd26a7855f7c8026d4d68044b0fd2dffa4494005001f26890c685bd1be51717d0472bb44094d8c1d696a6db9251f7eef9a0dfa2