Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
03/02/2024, 03:48
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-03_aef0cbfae8d92494ce8e47792a5fc53e_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-02-03_aef0cbfae8d92494ce8e47792a5fc53e_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-03_aef0cbfae8d92494ce8e47792a5fc53e_cryptolocker.exe
-
Size
37KB
-
MD5
aef0cbfae8d92494ce8e47792a5fc53e
-
SHA1
a8518d9ddcbce91ff61fc62d2815854f115cc747
-
SHA256
a68a47130f7fd325330fe40b9bed26417364ac83461afe1386339f341c7c7a92
-
SHA512
d4e16c5571e4130227065a0bbbed6f69290fff2d5ba18a9e6f8fd10bf115ec3db4a8a8a2236e07aede1bb6ac168a4e394a85d5e62be18395461034e9432728ff
-
SSDEEP
768:UEEmoQDj/xnMp+yptndwe/PWQtOOtEvwDpjLenBLR:ZzFbxmLPWQMOtEvwDpjLeL
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x0009000000012203-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 3032 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2932 2024-02-03_aef0cbfae8d92494ce8e47792a5fc53e_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2932 wrote to memory of 3032 2932 2024-02-03_aef0cbfae8d92494ce8e47792a5fc53e_cryptolocker.exe 28 PID 2932 wrote to memory of 3032 2932 2024-02-03_aef0cbfae8d92494ce8e47792a5fc53e_cryptolocker.exe 28 PID 2932 wrote to memory of 3032 2932 2024-02-03_aef0cbfae8d92494ce8e47792a5fc53e_cryptolocker.exe 28 PID 2932 wrote to memory of 3032 2932 2024-02-03_aef0cbfae8d92494ce8e47792a5fc53e_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-03_aef0cbfae8d92494ce8e47792a5fc53e_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-03_aef0cbfae8d92494ce8e47792a5fc53e_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD54f6dfa38cfdf7c13f73cd25ca091ad12
SHA1020adb5b636df02faba763d65c7ece9bfa09c0d3
SHA25691848d1f02e394bfce4d497628559402f4c7ebab04e12dd677938ee0bfe95372
SHA5127574547e1329101b0140ce51782fe3787538a571f272dc11c002c8c367ec732d4ad3ab2ad55fa316726041ad06c483884e690df5cf235fce634197abbe19e803