Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 17:33
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-13_3229fb5067c0b6ac80e8782b08ffe118_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-13_3229fb5067c0b6ac80e8782b08ffe118_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-13_3229fb5067c0b6ac80e8782b08ffe118_cryptolocker.exe
-
Size
54KB
-
MD5
3229fb5067c0b6ac80e8782b08ffe118
-
SHA1
761a7f1ff42940329c032918d7e8cdb08d96fd51
-
SHA256
2d15515f160301a43dc258fea551e5c558d79f7e2ec5a69e51cfe24ec8d03731
-
SHA512
71d099c3fa22c888062e11c02a861091ae878cd8d6e56380127752efd95b84259b0ae10fd1c3ac69f1ef1253727f1895cbeab92099b22ac97de7ec3a1e13d01c
-
SSDEEP
768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqPOYRmNxt5QJz7Wwfl:6j+1NMOtEvwDpjr8oxE5
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral1/memory/2248-0-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000c00000001225f-11.dat CryptoLocker_rule2 behavioral1/memory/2248-15-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral1/memory/1796-16-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral1/memory/1796-26-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 5 IoCs
resource yara_rule behavioral1/memory/2248-0-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral1/files/0x000c00000001225f-11.dat CryptoLocker_set1 behavioral1/memory/2248-15-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral1/memory/1796-16-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral1/memory/1796-26-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 -
Detects executables built or packed with MPress PE compressor 5 IoCs
resource yara_rule behavioral1/memory/2248-0-0x0000000000500000-0x000000000050F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/files/0x000c00000001225f-11.dat INDICATOR_EXE_Packed_MPress behavioral1/memory/2248-15-0x0000000000500000-0x000000000050F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/1796-16-0x0000000000500000-0x000000000050F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/1796-26-0x0000000000500000-0x000000000050F000-memory.dmp INDICATOR_EXE_Packed_MPress -
Executes dropped EXE 1 IoCs
pid Process 1796 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2248 2024-02-13_3229fb5067c0b6ac80e8782b08ffe118_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2248 wrote to memory of 1796 2248 2024-02-13_3229fb5067c0b6ac80e8782b08ffe118_cryptolocker.exe 28 PID 2248 wrote to memory of 1796 2248 2024-02-13_3229fb5067c0b6ac80e8782b08ffe118_cryptolocker.exe 28 PID 2248 wrote to memory of 1796 2248 2024-02-13_3229fb5067c0b6ac80e8782b08ffe118_cryptolocker.exe 28 PID 2248 wrote to memory of 1796 2248 2024-02-13_3229fb5067c0b6ac80e8782b08ffe118_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_3229fb5067c0b6ac80e8782b08ffe118_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-13_3229fb5067c0b6ac80e8782b08ffe118_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:1796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54KB
MD51a5e6f5fef6adaebd78513e066b10e40
SHA1e2c216095b59a8512f1d535b79df1136e31b65c6
SHA256a18b32342cc26eec916885d3d07a0b705afed5d0a4e0adbefd71483274b7398a
SHA5120766389408caf2555b81b7267872e595899a45e1ee42e3fc165fdb5e34e98e9051bb0c082d6bafd092d49fa1c85d9cdd6cf7496509db512632ba5f429b77ee6f