Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11-01-2024 05:54
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-10_9f24d63710f8b881d17d815167827b37_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-10_9f24d63710f8b881d17d815167827b37_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-10_9f24d63710f8b881d17d815167827b37_cryptolocker.exe
-
Size
38KB
-
MD5
9f24d63710f8b881d17d815167827b37
-
SHA1
bcb468c4002218084a867a6a6877d36b9d83b2e6
-
SHA256
15d6f114e3d97b764506cd5f8ec408a06f5670ceb9d0792a7119cbc1fd6b6508
-
SHA512
d00ee8c0c2e440b21f36b35a94467e16dcff07882a962c55b59ebe6c9dfffb227412580826b976463211cc01d8299de3cfa698e19c7fd2948b30d011cbe760fc
-
SSDEEP
768:UEEmoQDj/xnMp+yptndwe/PWQtOOtEvwDpjLenQLJJO:ZzFbxmLPWQMOtEvwDpjLeU3O
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2720 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2536 2024-01-10_9f24d63710f8b881d17d815167827b37_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2720 2536 2024-01-10_9f24d63710f8b881d17d815167827b37_cryptolocker.exe 28 PID 2536 wrote to memory of 2720 2536 2024-01-10_9f24d63710f8b881d17d815167827b37_cryptolocker.exe 28 PID 2536 wrote to memory of 2720 2536 2024-01-10_9f24d63710f8b881d17d815167827b37_cryptolocker.exe 28 PID 2536 wrote to memory of 2720 2536 2024-01-10_9f24d63710f8b881d17d815167827b37_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-10_9f24d63710f8b881d17d815167827b37_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-10_9f24d63710f8b881d17d815167827b37_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD5a3e602720750171ce194215093d582db
SHA170c28b049346b6bbd32285b2d0ec093500b2bd19
SHA25650709b20992bfd8fbaa56cf97031fc71cd5eb29be0f6b4cdf1047eb955daa56b
SHA512d29a21e164435e9cee1fc20ab86df7b1d31c82f0eaa7f79f0ada5cde48facf23963c919f5416ee03f4cb966436529ddc75755562c5a6062b68910ab7c8455864