Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
27/01/2024, 11:27
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-27_28527731acfd3989862664df64478282_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-27_28527731acfd3989862664df64478282_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-27_28527731acfd3989862664df64478282_cryptolocker.exe
-
Size
125KB
-
MD5
28527731acfd3989862664df64478282
-
SHA1
39718922f33372425e6b3efaa64f8f86d1b23d0f
-
SHA256
e02599d2784565b19bc944c74501f6463f300aa9b817e2b0cbca4c4ecb4880c9
-
SHA512
305cfe86565fa89a5ca12f630cae76d5fc72da13d40e82b6d46ce3773a7609d39064e4e4f0ed9e69f6cce2b2add880748a23743767e4a9ad89c5bacd03a7edb4
-
SSDEEP
1536:gUj+AIMOtEvwDpjNbwQEIPlemUhYwkkxGBpH:vCA9OtEvwDpjL
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000e00000001223e-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000e00000001223e-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2708 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2644 2024-01-27_28527731acfd3989862664df64478282_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2708 2644 2024-01-27_28527731acfd3989862664df64478282_cryptolocker.exe 28 PID 2644 wrote to memory of 2708 2644 2024-01-27_28527731acfd3989862664df64478282_cryptolocker.exe 28 PID 2644 wrote to memory of 2708 2644 2024-01-27_28527731acfd3989862664df64478282_cryptolocker.exe 28 PID 2644 wrote to memory of 2708 2644 2024-01-27_28527731acfd3989862664df64478282_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-27_28527731acfd3989862664df64478282_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-27_28527731acfd3989862664df64478282_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
125KB
MD5d3b1954b9ef257ca77fb5cf6f34d69bf
SHA19c0d787baa60a72b938dedd309fb7141161d82da
SHA2562cf8abd4dee8294925a3fc258f800c0795aeae93dc4944a41b71cd5df8c529a0
SHA512e7d92fc6ebf564e0b4fcff3eced97931609cbb022a4c09aaaa0fe771b0d4998b404b5c8d3d2ce78d7f84ffca8fd3d1e5c568b9045237776401010f3606e0cdb1