Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
10/01/2024, 05:58
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-09_951fee48f3b71e559277458a83a8adfe_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-09_951fee48f3b71e559277458a83a8adfe_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-09_951fee48f3b71e559277458a83a8adfe_cryptolocker.exe
-
Size
64KB
-
MD5
951fee48f3b71e559277458a83a8adfe
-
SHA1
5b69d7e2ffc76e89ba7972f0f417b5e1d828f167
-
SHA256
af67ee124a582e7e3999164a79f95b3ddcdfe3fd36ad158f584f680ed2ca1d06
-
SHA512
6aaba0e26eef32605a7f2d80661c5a1629fbc0550bcb4a67717c2588ce4865484cb0a2002527f5ec10dc6108dab6a14a9fb89b245b647cf0dfc76e5c2e52c683
-
SSDEEP
1536:vj+jsMQMOtEvwDpj5HyCyh7vtRJ4BqKb1knzhl:vCjsIOtEvwDpj5Hv0j
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2160 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1972 2024-01-09_951fee48f3b71e559277458a83a8adfe_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2160 1972 2024-01-09_951fee48f3b71e559277458a83a8adfe_cryptolocker.exe 16 PID 1972 wrote to memory of 2160 1972 2024-01-09_951fee48f3b71e559277458a83a8adfe_cryptolocker.exe 16 PID 1972 wrote to memory of 2160 1972 2024-01-09_951fee48f3b71e559277458a83a8adfe_cryptolocker.exe 16 PID 1972 wrote to memory of 2160 1972 2024-01-09_951fee48f3b71e559277458a83a8adfe_cryptolocker.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"1⤵
- Executes dropped EXE
PID:2160
-
C:\Users\Admin\AppData\Local\Temp\2024-01-09_951fee48f3b71e559277458a83a8adfe_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-09_951fee48f3b71e559277458a83a8adfe_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD52ad1943458af1c302ca22d4b9c7cffad
SHA1c74c5429f5954534484ac8f747a4e61146d43650
SHA256be8d60b9d20584c389547b73a96b8534d02d51ee9a787d034dacad6fa18feb93
SHA512427014c386f626f7047e6ad8f4cac2c94968cd7d35a2eb7a21066d438f029ca79d852bb557ca0e910d9bd1efd31863eae92b9e6b896919b686dc0d3722fae148
-
Filesize
64KB
MD5246049541e3f763cd0d083a95d70ab2c
SHA168196c0d838e97fc26e1f0072527d1a5eec6a83e
SHA2561c46589d653a9d14778048449988c083037f997bfa1fa44fc0114a64b5d68c8e
SHA51234d73e8f9edb689bfb631277289e854ae61f2340ca3b43f4b2da997ee31f11798ff664fc6cdc0dd953862dc93db8575d1c8cbc7fa258e8a552214be218a67e17
-
Filesize
37KB
MD5f9acc7adc1b16dabacac7117d3773788
SHA16fe9a16122080dc701b61dff64251366a248cb74
SHA256011045edbb6ee5c5dfe5e0feceb7310e271436a0c208e494658c4fc899997105
SHA5120fe57b898853a27eb0b10195bbb676a58b30b3c931638620bd293e1f8941155be5062c14ad06b36e2b4484048a8d7c532d40c17dbe60cb570b8e99b234c727d8