Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14/02/2024, 14:04
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-14_f2859eed779c80fd0ac2eea8b6b5e47d_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-14_f2859eed779c80fd0ac2eea8b6b5e47d_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-14_f2859eed779c80fd0ac2eea8b6b5e47d_cryptolocker.exe
-
Size
38KB
-
MD5
f2859eed779c80fd0ac2eea8b6b5e47d
-
SHA1
3cd6c48557daf3ea2c5ed3d5e7082817fcc21a2e
-
SHA256
63c4d93bc18c8a5a9f2f02a4bd5787e20f78369df80e8a04d142b053b3666cc2
-
SHA512
2d8a37bff0f2e7ca506f59e61eb6685b0c73a3f3d440c51c2cfa64e15ea7e5db87aeda82ca9a7176566ffa2e5b17f11dbb38a4433152616978c5797462c7e6d4
-
SSDEEP
768:XS5nQJ24LR1bytOOtEvwDpj66BLbjG9Rva/yY8:i5nkFGMOtEvwDpjR+viH8
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral1/memory/2640-0-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000a000000012243-11.dat CryptoLocker_rule2 behavioral1/memory/2932-16-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2640-15-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2932-26-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 2 IoCs
resource yara_rule behavioral1/memory/2640-15-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral1/memory/2932-26-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 -
Detects executables built or packed with MPress PE compressor 5 IoCs
resource yara_rule behavioral1/memory/2640-0-0x0000000000500000-0x000000000050F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/files/0x000a000000012243-11.dat INDICATOR_EXE_Packed_MPress behavioral1/memory/2932-16-0x0000000000500000-0x000000000050F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2640-15-0x0000000000500000-0x000000000050F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2932-26-0x0000000000500000-0x000000000050F000-memory.dmp INDICATOR_EXE_Packed_MPress -
Executes dropped EXE 1 IoCs
pid Process 2932 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2640 2024-02-14_f2859eed779c80fd0ac2eea8b6b5e47d_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2640 wrote to memory of 2932 2640 2024-02-14_f2859eed779c80fd0ac2eea8b6b5e47d_cryptolocker.exe 28 PID 2640 wrote to memory of 2932 2640 2024-02-14_f2859eed779c80fd0ac2eea8b6b5e47d_cryptolocker.exe 28 PID 2640 wrote to memory of 2932 2640 2024-02-14_f2859eed779c80fd0ac2eea8b6b5e47d_cryptolocker.exe 28 PID 2640 wrote to memory of 2932 2640 2024-02-14_f2859eed779c80fd0ac2eea8b6b5e47d_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-14_f2859eed779c80fd0ac2eea8b6b5e47d_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-14_f2859eed779c80fd0ac2eea8b6b5e47d_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD5dcb7f099c1436e9be8fdb4146afc1a01
SHA1973fcda976ef3fbcc44d4e1a73a30c71dc5e6351
SHA25662fb9af387ab2437d67bfb80b40cc8bef0b204b129a77a45e45fbf8300671e09
SHA5122f49f8c449db8ead1eb30d0af9882d12291f780fdf1792a2aee2a4f26f417fc1a6a0df48a26d28253c96b7872617dc162cb346e73c2dfc69464ac90421b541b1