Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-01-2024 08:23
Behavioral task
behavioral1
Sample
2024-01-24_15faeac45c061f778df7fb109304487f_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-24_15faeac45c061f778df7fb109304487f_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-24_15faeac45c061f778df7fb109304487f_cryptolocker.exe
-
Size
89KB
-
MD5
15faeac45c061f778df7fb109304487f
-
SHA1
dc3a0569cbc18a5afe4a80c23eb3981929dc1c1e
-
SHA256
4c0c6e940453a5a274c40fab22c320434b1ed3a9e2e569d4b3c1eb51eb7092c7
-
SHA512
8dafc102851c6725892f4edfd1a3f25ec332257c61396028bc6504860b33f2811b83f71976c0a92db13d89cfb42f13e17f06028992c441d9b372e1b996d8688b
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRMy87+:zCsanOtEvwDpj+
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral1/memory/3028-0-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000b000000012185-11.dat CryptoLocker_rule2 behavioral1/memory/3028-15-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2944-17-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2944-27-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 5 IoCs
resource yara_rule behavioral1/memory/3028-0-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 behavioral1/files/0x000b000000012185-11.dat CryptoLocker_set1 behavioral1/memory/3028-15-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 behavioral1/memory/2944-17-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 behavioral1/memory/2944-27-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 -
UPX dump on OEP (original entry point) 5 IoCs
resource yara_rule behavioral1/memory/3028-0-0x0000000000500000-0x0000000000510000-memory.dmp UPX behavioral1/files/0x000b000000012185-11.dat UPX behavioral1/memory/3028-15-0x0000000000500000-0x0000000000510000-memory.dmp UPX behavioral1/memory/2944-17-0x0000000000500000-0x0000000000510000-memory.dmp UPX behavioral1/memory/2944-27-0x0000000000500000-0x0000000000510000-memory.dmp UPX -
Executes dropped EXE 1 IoCs
pid Process 2944 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 3028 2024-01-24_15faeac45c061f778df7fb109304487f_cryptolocker.exe -
resource yara_rule behavioral1/memory/3028-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x000b000000012185-11.dat upx behavioral1/memory/3028-15-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2944-17-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2944-27-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2944 3028 2024-01-24_15faeac45c061f778df7fb109304487f_cryptolocker.exe 28 PID 3028 wrote to memory of 2944 3028 2024-01-24_15faeac45c061f778df7fb109304487f_cryptolocker.exe 28 PID 3028 wrote to memory of 2944 3028 2024-01-24_15faeac45c061f778df7fb109304487f_cryptolocker.exe 28 PID 3028 wrote to memory of 2944 3028 2024-01-24_15faeac45c061f778df7fb109304487f_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-24_15faeac45c061f778df7fb109304487f_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-24_15faeac45c061f778df7fb109304487f_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD5cbc284c20f1de2eedabadc65545e825b
SHA16e5d1f0adc5eb3d057c49fa163d5415ca636423f
SHA25692c1754c03583b506e8503174b7ad2b4489fdda15774ad677cf314c17e6d12fe
SHA512f42f77262a87203be6f8d2e6248e37af05534397f72964e34029672fc27edfed348d2a075ce6b325df9dcf8f8ef4ea910048439e0287a07f1245ae4c9b227c1d