Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-01-2024 08:31
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-24_8365e2b7837a9833d4a47063ed7da14f_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-24_8365e2b7837a9833d4a47063ed7da14f_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-24_8365e2b7837a9833d4a47063ed7da14f_cryptolocker.exe
-
Size
123KB
-
MD5
8365e2b7837a9833d4a47063ed7da14f
-
SHA1
cbe5ed303145eb0182e25b423dfc549dc5438e20
-
SHA256
bae430335c05a03a20aa78e174b1655082ee2e269b3b87b124c6e6dc8c9f92ba
-
SHA512
5e83ff18ec41ff2b6042a167f29e6a4777af0c3c15b58837d4e3dcd6de7c54b4e47b633e27ec5748fee1c544ccd1a0b3a559b10fab8f57f961b80f9980e0e846
-
SSDEEP
1536:gUj+AIMOtEvwDpjNbwQEIPlemUhYwkkxE4qH:vCA9OtEvwDpjF
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000b0000000126e7-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000b0000000126e7-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2728 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1848 2024-01-24_8365e2b7837a9833d4a47063ed7da14f_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1848 wrote to memory of 2728 1848 2024-01-24_8365e2b7837a9833d4a47063ed7da14f_cryptolocker.exe 28 PID 1848 wrote to memory of 2728 1848 2024-01-24_8365e2b7837a9833d4a47063ed7da14f_cryptolocker.exe 28 PID 1848 wrote to memory of 2728 1848 2024-01-24_8365e2b7837a9833d4a47063ed7da14f_cryptolocker.exe 28 PID 1848 wrote to memory of 2728 1848 2024-01-24_8365e2b7837a9833d4a47063ed7da14f_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-24_8365e2b7837a9833d4a47063ed7da14f_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-24_8365e2b7837a9833d4a47063ed7da14f_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
123KB
MD5aab21adf9ab2c301170bff4f84772047
SHA1dcccbd316dcc93a57e7dd3b600cfcf9815a8a5f1
SHA256d613f57ad12e0a6151d14dbc00c48b588f14680cd667242274371096185405c6
SHA512d8a74b9a4dbfdc7abd138b6d0179f8cebe60641b497bcb1370530fe5a5b86cca331d61cb925d83a6c8433eebcc58cd7579299242db1787c3ece081b9b977ab74