Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18/01/2024, 13:15
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-18_a3b97cd6fc55f113b91d928ee7fe58f3_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-18_a3b97cd6fc55f113b91d928ee7fe58f3_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-18_a3b97cd6fc55f113b91d928ee7fe58f3_cryptolocker.exe
-
Size
88KB
-
MD5
a3b97cd6fc55f113b91d928ee7fe58f3
-
SHA1
0eac49cd880f0a908ec7a9f0c263e8ca83fc50ca
-
SHA256
007f0363b4f690802952a294790ac215d99cc77b7b27f38b9120983b60fe602e
-
SHA512
5d2480ab3333498d53a5817d2eb4a7250b8cb2e005a826ffcfbe2f4000a50f3bc7d7b44d56f53fe8727fd52d4b416b32517e09f9db4458f3ae303dd2a5b5f742
-
SSDEEP
768:xQz7yVEhs9+4uR1bytOOtEvwDpjWfbZ7uyA36S7MpxRXrZSUfFKazNcCJgW:xj+VGMOtEvwDpjubwQEI8UtzNcsH
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral1/memory/2112-0-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000b00000001225d-11.dat CryptoLocker_rule2 behavioral1/memory/2668-16-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2112-15-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2668-25-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 5 IoCs
resource yara_rule behavioral1/memory/2112-0-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 behavioral1/files/0x000b00000001225d-11.dat CryptoLocker_set1 behavioral1/memory/2668-16-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 behavioral1/memory/2112-15-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 behavioral1/memory/2668-25-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 -
Detects executables built or packed with MPress PE compressor 5 IoCs
resource yara_rule behavioral1/memory/2112-0-0x0000000000500000-0x0000000000510000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/files/0x000b00000001225d-11.dat INDICATOR_EXE_Packed_MPress behavioral1/memory/2668-16-0x0000000000500000-0x0000000000510000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2112-15-0x0000000000500000-0x0000000000510000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2668-25-0x0000000000500000-0x0000000000510000-memory.dmp INDICATOR_EXE_Packed_MPress -
Executes dropped EXE 1 IoCs
pid Process 2668 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2112 2024-01-18_a3b97cd6fc55f113b91d928ee7fe58f3_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2668 2112 2024-01-18_a3b97cd6fc55f113b91d928ee7fe58f3_cryptolocker.exe 28 PID 2112 wrote to memory of 2668 2112 2024-01-18_a3b97cd6fc55f113b91d928ee7fe58f3_cryptolocker.exe 28 PID 2112 wrote to memory of 2668 2112 2024-01-18_a3b97cd6fc55f113b91d928ee7fe58f3_cryptolocker.exe 28 PID 2112 wrote to memory of 2668 2112 2024-01-18_a3b97cd6fc55f113b91d928ee7fe58f3_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-18_a3b97cd6fc55f113b91d928ee7fe58f3_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-18_a3b97cd6fc55f113b91d928ee7fe58f3_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD5072a5378185dec46d1e0d3630f9dce15
SHA1d5a4e437d3c08a98c5794fd6b3438f9429a20398
SHA2563fce3b0e3779bbb2fc18bba643f0bda1530de4aabf9e52e32f61c984376b49c9
SHA512fed7a70a330b31ef188c319162f301b345799a47166b6c00b3ebfe2e9d984e441c614efef1f4741bda94db142907ce2ab929973c43404a1b29e9d6ec449ec273