Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14/02/2024, 18:46
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-14_784f0d056258ba5168d232f4053dd4b8_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-14_784f0d056258ba5168d232f4053dd4b8_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-14_784f0d056258ba5168d232f4053dd4b8_cryptolocker.exe
-
Size
41KB
-
MD5
784f0d056258ba5168d232f4053dd4b8
-
SHA1
1f0dccc7a6a4cc93f8d83351d0f762b8e3d28d10
-
SHA256
3863fe28769407fa0e6d1c7a7d9e6451b30ec04686ec7c7fd34d6eccbfca08f8
-
SHA512
73deec7a3cae3c1dcebeb9e53abed4303a15365b0f09507a926fa0e7c1d56ce4e41cbee9915fa21ed1c6f4bcd94b9e11265e151f9094137bc30621edf0bba4f1
-
SSDEEP
768:UEEmoQDj/xnMp+yptndwe/PWQtOOtEvwDpjLenQL3bTa:ZzFbxmLPWQMOtEvwDpjLeU3S
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x0007000000012287-11.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2740 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1932 2024-02-14_784f0d056258ba5168d232f4053dd4b8_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1932 wrote to memory of 2740 1932 2024-02-14_784f0d056258ba5168d232f4053dd4b8_cryptolocker.exe 28 PID 1932 wrote to memory of 2740 1932 2024-02-14_784f0d056258ba5168d232f4053dd4b8_cryptolocker.exe 28 PID 1932 wrote to memory of 2740 1932 2024-02-14_784f0d056258ba5168d232f4053dd4b8_cryptolocker.exe 28 PID 1932 wrote to memory of 2740 1932 2024-02-14_784f0d056258ba5168d232f4053dd4b8_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-14_784f0d056258ba5168d232f4053dd4b8_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-14_784f0d056258ba5168d232f4053dd4b8_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD56b1ed550d2dd827db4b7c23f80cc9e0e
SHA13dabfe5713ed49a79c5e97267a9e82b8a8995d24
SHA256e50dca98a2f4ff207b78ed131a31fc4a9a8a8b089533d8cb3b18750883dc7909
SHA51236e8aa145660c474f37a285bef5b0d5629a52da7e99c5bb73227905edea0e1607fc30a7c13e72a5a37d9ecbeb29325b6c1aa63bef0e81192106ecd5cb3f20ca7