Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/01/2024, 11:31
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-25_a6a2d62419799b40130616ff394bef27_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-25_a6a2d62419799b40130616ff394bef27_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-25_a6a2d62419799b40130616ff394bef27_cryptolocker.exe
-
Size
38KB
-
MD5
a6a2d62419799b40130616ff394bef27
-
SHA1
7a8e5a8ed11574622868d04b026013f50d453699
-
SHA256
6b6e7a8974ec99f6ef37f1b33715764f473aa332bef160e2fa2cfe30561e031c
-
SHA512
c66b8372a58cb7a72ded68e57f3c49654e42ebf9302aa5522df00793e9d3cb2c1cbc3f1d3ddc2c51abd4223b1f2987c38fb8a07dc7b7b4ed584d51a9e31ca302
-
SSDEEP
768:TS5nQJ24LR7tOOtEvwDpjGqPhqlcnvhx5/xFRj:m5nkFNMOtEvwDpjG8hhXx
Malware Config
Signatures
-
Detection of CryptoLocker Variants 6 IoCs
resource yara_rule behavioral1/memory/1712-0-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000c00000001220d-11.dat CryptoLocker_rule2 behavioral1/memory/1712-13-0x0000000002740000-0x000000000274E000-memory.dmp CryptoLocker_rule2 behavioral1/memory/1712-16-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2108-18-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2108-26-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 4 IoCs
resource yara_rule behavioral1/memory/1712-0-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_set1 behavioral1/memory/1712-16-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_set1 behavioral1/memory/2108-18-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_set1 behavioral1/memory/2108-26-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_set1 -
Detects executables built or packed with MPress PE compressor 6 IoCs
resource yara_rule behavioral1/memory/1712-0-0x0000000000500000-0x000000000050E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/files/0x000c00000001220d-11.dat INDICATOR_EXE_Packed_MPress behavioral1/memory/1712-13-0x0000000002740000-0x000000000274E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/1712-16-0x0000000000500000-0x000000000050E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2108-18-0x0000000000500000-0x000000000050E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2108-26-0x0000000000500000-0x000000000050E000-memory.dmp INDICATOR_EXE_Packed_MPress -
Executes dropped EXE 1 IoCs
pid Process 2108 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1712 2024-01-25_a6a2d62419799b40130616ff394bef27_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2108 1712 2024-01-25_a6a2d62419799b40130616ff394bef27_cryptolocker.exe 28 PID 1712 wrote to memory of 2108 1712 2024-01-25_a6a2d62419799b40130616ff394bef27_cryptolocker.exe 28 PID 1712 wrote to memory of 2108 1712 2024-01-25_a6a2d62419799b40130616ff394bef27_cryptolocker.exe 28 PID 1712 wrote to memory of 2108 1712 2024-01-25_a6a2d62419799b40130616ff394bef27_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_a6a2d62419799b40130616ff394bef27_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-25_a6a2d62419799b40130616ff394bef27_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD5dd0fefd3440da970d5ff6aaf75cbfcac
SHA1d95096f169d103da598e049579a81b743ee19577
SHA25606552004bf89ff885c8d2e314897446184e193c915b03938b73849ca27a1cabf
SHA512daeee1d5033485a41f2ab88b7b1c70cd4efa56417961618f1647e69e8e4204d0390b085d37c96106ae1b95daee570b0769f44dc4969ae19b7ce78741994889e5