Analysis
-
max time kernel
0s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
10/01/2024, 05:59
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-09_ad2979ed34cdeb421aa1e56e9fa15142_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-09_ad2979ed34cdeb421aa1e56e9fa15142_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-09_ad2979ed34cdeb421aa1e56e9fa15142_cryptolocker.exe
-
Size
93KB
-
MD5
ad2979ed34cdeb421aa1e56e9fa15142
-
SHA1
9f78ec27bc117bcb784acfe85da2f891f2564df3
-
SHA256
7ba066f1e134a5e3b56842ba1dafb2bfb06ac439749636b8fbffd1c9f9d28195
-
SHA512
9a9520a81d7c1cb11755f668558647aac43d1909e22376ccafdce55a39389b258bcbb004a83e75c6bf50123fe02b83331cd32dde517a1eb3159291b1dacd0575
-
SSDEEP
768:xQz7yVEhs9+4uR1bytOOtEvwDpjWfbZ7uyA36S7MpxRiWNa9mktJb:xj+VGMOtEvwDpjubwQEIiVmkv
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3028 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1108 2024-01-09_ad2979ed34cdeb421aa1e56e9fa15142_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1108 wrote to memory of 3028 1108 2024-01-09_ad2979ed34cdeb421aa1e56e9fa15142_cryptolocker.exe 16 PID 1108 wrote to memory of 3028 1108 2024-01-09_ad2979ed34cdeb421aa1e56e9fa15142_cryptolocker.exe 16 PID 1108 wrote to memory of 3028 1108 2024-01-09_ad2979ed34cdeb421aa1e56e9fa15142_cryptolocker.exe 16 PID 1108 wrote to memory of 3028 1108 2024-01-09_ad2979ed34cdeb421aa1e56e9fa15142_cryptolocker.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"1⤵
- Executes dropped EXE
PID:3028
-
C:\Users\Admin\AppData\Local\Temp\2024-01-09_ad2979ed34cdeb421aa1e56e9fa15142_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-09_ad2979ed34cdeb421aa1e56e9fa15142_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD5ce5601cc0b689f6b00ff23322f833a18
SHA16403a8b3ce819dd877f229e914ade0b2b022b6dc
SHA256b4fe2a29bac775ac8da19a00c2be7806084b15e96b7f3aa511c5434f9f460f92
SHA5128d8c2937906cd3829862d51242bb7681f31f85769945e3c67e20b0cf1ff007f53e0ef7fce19cae6a1c6da657d627e0a3afbde111929527c790d0c2a9d6525781
-
Filesize
76KB
MD5d8f4446fa765c26798e72eaa71cd6d8a
SHA1b9ca00b7b6c147370a75646da7e0d000de45807b
SHA25691cef2bf8ca3173bc755188384c05a1d5f228af19fd3eff15cacfc4a40a0d892
SHA512849859470bdad8626e962f3b7ec4ab7f9e90d5bddda1f3a015e41ac14f9f1e07e303424902df5fb60bb3e384d85bc8f0649a3e6a6ecb6ad76c0ce6797ee70d42
-
Filesize
89KB
MD5d2e93b9ecd2e9a0beba1230eb0b4a296
SHA1c74da6e44f8b0f25f6ac89b6aa7e03997323df5e
SHA25694cce211ab863a439da2050ddf8673845d5acb1b76a4500972556344607f38b3
SHA5121d30bfa815c382264c6c7aab55bbadbe7d03e508928316e3ff54bb9d31a48d50eb5f6cb996adc120282cc5fb786db60aa64a3a761d589a6f496f80fa7f14540d