Analysis
-
max time kernel
163s -
max time network
186s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/01/2024, 06:02
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-11_96cd5d54244eb29ccd47b1ab03ae9c0c_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-11_96cd5d54244eb29ccd47b1ab03ae9c0c_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-11_96cd5d54244eb29ccd47b1ab03ae9c0c_cryptolocker.exe
-
Size
121KB
-
MD5
96cd5d54244eb29ccd47b1ab03ae9c0c
-
SHA1
3b48d537185e71eb36e11224dca0ebd2cc1d9805
-
SHA256
31b593732687fa1a462dc1dfb5d493720955e105ce885e5c23837871d0276bcc
-
SHA512
ea2647125559e7ae0e2247eb9b6c2ec172f2640e7c4b342301cb7794350000f49d0f158ffd90839934afaeb562685843e75285548eeda0e314cedbd851b23fbf
-
SSDEEP
1536:gUj+AIMOtEvwDpjNbwQEIPlemUhYwkkxE8:vCA9OtEvwDpj0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2776 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2084 2024-01-11_96cd5d54244eb29ccd47b1ab03ae9c0c_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2776 2084 2024-01-11_96cd5d54244eb29ccd47b1ab03ae9c0c_cryptolocker.exe 20 PID 2084 wrote to memory of 2776 2084 2024-01-11_96cd5d54244eb29ccd47b1ab03ae9c0c_cryptolocker.exe 20 PID 2084 wrote to memory of 2776 2084 2024-01-11_96cd5d54244eb29ccd47b1ab03ae9c0c_cryptolocker.exe 20 PID 2084 wrote to memory of 2776 2084 2024-01-11_96cd5d54244eb29ccd47b1ab03ae9c0c_cryptolocker.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-11_96cd5d54244eb29ccd47b1ab03ae9c0c_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-11_96cd5d54244eb29ccd47b1ab03ae9c0c_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD5eb3df83cc044b5527263cc87f1d4ff92
SHA12b853e8cc164539606841acfc51fd99622836f9c
SHA256abc9b91ddc489c90899cf7cd3f5a71f1ff8aedf3ece856d38f3c562300d17ed4
SHA512d339475c3171c43002fc116cc25ccb8ece73a68855ec6ec8b20ca53848af57008d2ab9be92bc3aec49bb668c21f254120c5ef260704c484691ad061c66b037fe
-
Filesize
121KB
MD50e768499c1a2c247e26054cd18b32f51
SHA16b9411b1a982c941483dbc32761e502fc4ebdc6a
SHA2562f2307afe883c29936e88e1a73b4a1af0d8defacd5fec49dcc0c66d78ce4eb80
SHA5127892d636258dbcfe95c8c3d192499a21dded59150f6bb524805dfb2cff2d9186690553f5cb65c2f799a25237849395fd341cc1caf16137d355c31b5a40521061