Analysis
-
max time kernel
181s -
max time network
188s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 05:56
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-10_d06fb81901aa5ce653c2417feb00dd77_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-10_d06fb81901aa5ce653c2417feb00dd77_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-10_d06fb81901aa5ce653c2417feb00dd77_cryptolocker.exe
-
Size
38KB
-
MD5
d06fb81901aa5ce653c2417feb00dd77
-
SHA1
e8d6eb5e9c0319b53630f8d2025a10fe60bb7a29
-
SHA256
cfb8742fabf5768fdf36b0c4b43f7d161ace33a0d7af23541290e6929936b652
-
SHA512
fe54fac83dd291deb9e883f844779f738ddd2c1c07469274681a553d3df465de51dfaf85c24041643418ac95d1a528d2215b116b25dfbe64a0f99b35f19f1c7c
-
SSDEEP
768:TS5nQJ24LR7tOOtEvwDpjGqPhqlcnvgpns:m5nkFNMOtEvwDpjG8hgps
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2576 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2716 2024-01-10_d06fb81901aa5ce653c2417feb00dd77_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2576 2716 2024-01-10_d06fb81901aa5ce653c2417feb00dd77_cryptolocker.exe 28 PID 2716 wrote to memory of 2576 2716 2024-01-10_d06fb81901aa5ce653c2417feb00dd77_cryptolocker.exe 28 PID 2716 wrote to memory of 2576 2716 2024-01-10_d06fb81901aa5ce653c2417feb00dd77_cryptolocker.exe 28 PID 2716 wrote to memory of 2576 2716 2024-01-10_d06fb81901aa5ce653c2417feb00dd77_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-10_d06fb81901aa5ce653c2417feb00dd77_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-10_d06fb81901aa5ce653c2417feb00dd77_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD5653f0c2ce486ed9d42d1f3d115cb64c1
SHA19e0d1ad1b3510bfd3863cf4a5ef7b766ed2fd58b
SHA2567ca620a96c557dbec1c4248a9e0566749cf5b9e1aa5abc54024512277a839fd0
SHA5128c03736cd5157609357cd7fdde2e62354762d235a6574dc3aeccc11eabde5ea40f21d1800d996761be53237dfa9f6e99d8b0076ee23fa5e88d0dfb5eb5016c7c