Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-01-2024 19:35
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-26_946868b22d373d949c69b3763218db46_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-26_946868b22d373d949c69b3763218db46_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-26_946868b22d373d949c69b3763218db46_cryptolocker.exe
-
Size
59KB
-
MD5
946868b22d373d949c69b3763218db46
-
SHA1
af19d722bd8cb56e6774bda6104918c96757d124
-
SHA256
60eb711c3ec8eaf9d378f6b8d49a493f812ac16e01228c2301d9d3d60e2efd47
-
SHA512
b7939eaa021c60aa5a49b4eb5c0a8f43ed255e4a8251e046bf0c911a4542e732e2ed60dde3012f92d592c39b789a3ca36736e7e2a0bc57c3d46093c2d96dbc22
-
SSDEEP
768:vQz7yVEhs9+js1SQtOOtEvwDpjz9+4hdCY8EQMjpi/Wpi3B3URiLnuoUwUsfqB1b:vj+jsMQMOtEvwDpj5Hy7B3gG8xzUe
Malware Config
Signatures
-
Detection of CryptoLocker Variants 3 IoCs
resource yara_rule behavioral1/files/0x000c000000012261-22.dat CryptoLocker_rule2 behavioral1/files/0x000c000000012261-13.dat CryptoLocker_rule2 behavioral1/files/0x000c000000012261-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 3 IoCs
resource yara_rule behavioral1/files/0x000c000000012261-22.dat CryptoLocker_set1 behavioral1/files/0x000c000000012261-13.dat CryptoLocker_set1 behavioral1/files/0x000c000000012261-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2672 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2608 2024-01-26_946868b22d373d949c69b3763218db46_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2608 wrote to memory of 2672 2608 2024-01-26_946868b22d373d949c69b3763218db46_cryptolocker.exe 14 PID 2608 wrote to memory of 2672 2608 2024-01-26_946868b22d373d949c69b3763218db46_cryptolocker.exe 14 PID 2608 wrote to memory of 2672 2608 2024-01-26_946868b22d373d949c69b3763218db46_cryptolocker.exe 14 PID 2608 wrote to memory of 2672 2608 2024-01-26_946868b22d373d949c69b3763218db46_cryptolocker.exe 14
Processes
-
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"1⤵
- Executes dropped EXE
PID:2672
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_946868b22d373d949c69b3763218db46_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-26_946868b22d373d949c69b3763218db46_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2608
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD57ef9ed4bdf38d8be4c8dd1debef30018
SHA1e1ce3e7b6c6c3bee8bf2d48403d2cd2124d7530e
SHA256389b06a1452629b86d57f1dcf970342f4d73e6446abe024e4156dfd6e5d3dd0d
SHA5129d5e319409db86c2db45918f2214a13e3006998eea054ecd34433da6beefd4d5b915c8508a0824c49fcabe93a1491926d24095b21b4b000053f90c71ecf853fe
-
Filesize
5KB
MD5cde7bcbe1dde38fef43640b4013894e2
SHA169032801c9c9327b75e51cfe034c063bd9bb2959
SHA2560ed9ac8f3af672dbf7503710691ee4b9338ce32458107f2777b763eef281dbbc
SHA512406fe8e931e40febb76b9704043febfc1fe415eadf2f293fd770dfa0679ecd38fed3284774686a7f6a091270da16331c1d1f2f8e9364bae3a12142a141a68e41
-
Filesize
60KB
MD508a7135c0d051b5de420aa1d658628bc
SHA17337982ca69645c45cff9f2666aa537f3baf08bd
SHA2565b68e4940e1e2f8c4b090fc8a771f613f7e35efd650c07291986f4ba265fab37
SHA512f79889ecdcca43646b2f79cb49e2125ee5f727b9f8c5f932ff364cb773820199ad0f50dcbae97fa1734491a8b9cbf95f707a79e9870a0275b1b96ae05f944782