Analysis
-
max time kernel
0s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10-01-2024 06:02
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-09_d7e5446e51445733f6b34dbebc4f8594_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-09_d7e5446e51445733f6b34dbebc4f8594_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-09_d7e5446e51445733f6b34dbebc4f8594_cryptolocker.exe
-
Size
37KB
-
MD5
d7e5446e51445733f6b34dbebc4f8594
-
SHA1
359bec58dc5d10b6ecfbf6a84427940fbcf7c722
-
SHA256
dedd529b3d41c117322cac6254071e0d1e40a79e88fcdfa000b0ba3d87060051
-
SHA512
90e9a461940900fff60e00fbee57695574371c12a3843a670b623bea9a61bd9033bb4c80ffbfb08c4923ca59186b1799cf83655683e312fcd1f7dec29a0db2bb
-
SSDEEP
768:UEEmoQDj/xnMp+yptndwe/PWQtOOtEvwDpjLenQLn:ZzFbxmLPWQMOtEvwDpjLeUn
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2192 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 816 2024-01-09_d7e5446e51445733f6b34dbebc4f8594_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 816 wrote to memory of 2192 816 2024-01-09_d7e5446e51445733f6b34dbebc4f8594_cryptolocker.exe 14 PID 816 wrote to memory of 2192 816 2024-01-09_d7e5446e51445733f6b34dbebc4f8594_cryptolocker.exe 14 PID 816 wrote to memory of 2192 816 2024-01-09_d7e5446e51445733f6b34dbebc4f8594_cryptolocker.exe 14 PID 816 wrote to memory of 2192 816 2024-01-09_d7e5446e51445733f6b34dbebc4f8594_cryptolocker.exe 14
Processes
-
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"1⤵
- Executes dropped EXE
PID:2192
-
C:\Users\Admin\AppData\Local\Temp\2024-01-09_d7e5446e51445733f6b34dbebc4f8594_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-09_d7e5446e51445733f6b34dbebc4f8594_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:816
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5907cff5fed8676aa4a410094e828df2b
SHA15b5c7996ddb5a006f453a8f3608e4923245c0a50
SHA256abb704922a1be1adf6a45200520157b5e7cd70e21d0694cfce53e0297167732a
SHA5127fda78c786f21e221b1903cceb58628e76d0aaa81cc8d975f94ec5eeb86a4f61eae002472e083714e9375388dc36e8b5530fea874a2f7e604cabf8b503dd8152