Analysis
-
max time kernel
150s -
max time network
171s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12-01-2024 05:54
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-11_0c2d6c900ada2d5ad67857c92ae1fadd_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-11_0c2d6c900ada2d5ad67857c92ae1fadd_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-11_0c2d6c900ada2d5ad67857c92ae1fadd_cryptolocker.exe
-
Size
39KB
-
MD5
0c2d6c900ada2d5ad67857c92ae1fadd
-
SHA1
7e712b2b4e9ccae4765e63cf91e26a0cec8a3adf
-
SHA256
aa85f59146d5e8fcd6eaceeb09b87792f4c4795c2da35913c43e46a2f44e7e7d
-
SHA512
16c81ec24b2bf5efbb341be87b4caa6fa2107b3230880354e236ee1997b9c2d55602368c25a71d1efcdd21eac9ecd9c3cc3a339b67d8185455fc0467e8c5ab08
-
SSDEEP
384:60VkMq01bJ3wtEwPS8HLEh+Jagz+3be+26aIIcVRYpetOOtEvwDpjqIGRmdHzOOS:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqh6/U
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2624 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1940 2024-01-11_0c2d6c900ada2d5ad67857c92ae1fadd_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2624 1940 2024-01-11_0c2d6c900ada2d5ad67857c92ae1fadd_cryptolocker.exe 28 PID 1940 wrote to memory of 2624 1940 2024-01-11_0c2d6c900ada2d5ad67857c92ae1fadd_cryptolocker.exe 28 PID 1940 wrote to memory of 2624 1940 2024-01-11_0c2d6c900ada2d5ad67857c92ae1fadd_cryptolocker.exe 28 PID 1940 wrote to memory of 2624 1940 2024-01-11_0c2d6c900ada2d5ad67857c92ae1fadd_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-11_0c2d6c900ada2d5ad67857c92ae1fadd_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-11_0c2d6c900ada2d5ad67857c92ae1fadd_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD58430be882d5e960498fbfa2e9b9f9924
SHA16e3d966a848e5cbcb353949aff595b3fc08239b1
SHA2561465820c3470d9354d564c0d740d5f1df2d8aed7915a7c6bd63f65f808782050
SHA5121b89a3f385888ff1f28a7c94ecdb8f6fd4225b44d59fb638d653e5f71b634ab571314f90590270d03d824e38ccc878c6260a0210bfc423170fd8c4699eb3b0a3