Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/02/2024, 02:17
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-03_9424fe18612bd22bfcbf10ee5d2d658b_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-03_9424fe18612bd22bfcbf10ee5d2d658b_cryptolocker.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-02-03_9424fe18612bd22bfcbf10ee5d2d658b_cryptolocker.exe
-
Size
44KB
-
MD5
9424fe18612bd22bfcbf10ee5d2d658b
-
SHA1
c56cb2d9610ae48b7351aa5814f3c178bd143c1e
-
SHA256
f36e5dadbba07ee83aea0cc7b07487ae19125f05d5a023e08050c27c58f682e3
-
SHA512
561c01b4d4b7d2548024d341c43078b3afb57311e3d86ca601fad0e261bcc767f3bf0dcc2e623c38573702949d8bc969a2176860c8aee1e5d67bc60b17ed922c
-
SSDEEP
768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqPhbCi44vCr:6j+1NMOtEvwDpjr8dx4x
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral1/memory/2456-0-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x0009000000012247-11.dat CryptoLocker_rule2 behavioral1/memory/2456-15-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2356-17-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2356-27-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 5 IoCs
resource yara_rule behavioral1/memory/2456-0-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral1/files/0x0009000000012247-11.dat CryptoLocker_set1 behavioral1/memory/2456-15-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral1/memory/2356-17-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral1/memory/2356-27-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 -
Detects executables built or packed with MPress PE compressor 5 IoCs
resource yara_rule behavioral1/memory/2456-0-0x0000000000500000-0x000000000050F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/files/0x0009000000012247-11.dat INDICATOR_EXE_Packed_MPress behavioral1/memory/2456-15-0x0000000000500000-0x000000000050F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2356-17-0x0000000000500000-0x000000000050F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2356-27-0x0000000000500000-0x000000000050F000-memory.dmp INDICATOR_EXE_Packed_MPress -
Executes dropped EXE 1 IoCs
pid Process 2356 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2456 2024-02-03_9424fe18612bd22bfcbf10ee5d2d658b_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2456 wrote to memory of 2356 2456 2024-02-03_9424fe18612bd22bfcbf10ee5d2d658b_cryptolocker.exe 28 PID 2456 wrote to memory of 2356 2456 2024-02-03_9424fe18612bd22bfcbf10ee5d2d658b_cryptolocker.exe 28 PID 2456 wrote to memory of 2356 2456 2024-02-03_9424fe18612bd22bfcbf10ee5d2d658b_cryptolocker.exe 28 PID 2456 wrote to memory of 2356 2456 2024-02-03_9424fe18612bd22bfcbf10ee5d2d658b_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-03_9424fe18612bd22bfcbf10ee5d2d658b_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-03_9424fe18612bd22bfcbf10ee5d2d658b_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2356
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD540b95e5c837d0640b9db558b97ffbfcb
SHA134ad347eae253b13e8080fa2915d541438b3895a
SHA256c2111fa3c8bc3634a9ae2897120459a2225546bfc1caf1ac4bb5541e2fb94ad6
SHA512e01464a52e4ca605970a4cec4acd499d929de9d912e39a55096b70a4edf2d4f6fa85ffb1e117cf7a8e1402686a1849b4cb3b5f49f071da032048566c4e441fd2