Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
17-02-2024 17:50
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-17_fd90ecc83d2e3fa2dfa3e1908a38818a_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-17_fd90ecc83d2e3fa2dfa3e1908a38818a_cryptolocker.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-02-17_fd90ecc83d2e3fa2dfa3e1908a38818a_cryptolocker.exe
-
Size
40KB
-
MD5
fd90ecc83d2e3fa2dfa3e1908a38818a
-
SHA1
090ac557d38bca5034b2e5d4c21e300534a2c776
-
SHA256
3e7e651b19f5fe5db0d25d5f02008f20cac3cff34b889ed58bc2ee749e6741db
-
SHA512
684da2a67ba9ac6213c5787bfb1e1cce0eac04edbdf3074aac75bc01a20b1f7deec42a41509d1b44269eba72e6db595485b6ca058c4ee24ae3a4b1377d021f21
-
SSDEEP
768:UEEmoQDj/xnMp+yptndwe/PWQtOOtEvwDpjLenQL3bTX:ZzFbxmLPWQMOtEvwDpjLeU3P
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x00090000000122c9-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2300 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2148 2024-02-17_fd90ecc83d2e3fa2dfa3e1908a38818a_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2300 2148 2024-02-17_fd90ecc83d2e3fa2dfa3e1908a38818a_cryptolocker.exe 28 PID 2148 wrote to memory of 2300 2148 2024-02-17_fd90ecc83d2e3fa2dfa3e1908a38818a_cryptolocker.exe 28 PID 2148 wrote to memory of 2300 2148 2024-02-17_fd90ecc83d2e3fa2dfa3e1908a38818a_cryptolocker.exe 28 PID 2148 wrote to memory of 2300 2148 2024-02-17_fd90ecc83d2e3fa2dfa3e1908a38818a_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-17_fd90ecc83d2e3fa2dfa3e1908a38818a_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-17_fd90ecc83d2e3fa2dfa3e1908a38818a_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2300
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD548c4fa669084bea6a9d52acf18f5d3cb
SHA1465487b5170c9d433a5f8e0f3cb3155edb33bf56
SHA256b9a15b042e1de11fc73caab761ef02f74559f5fb9bd4e59704f15aad82f5995d
SHA512750e046146dfbc0a66ed333e549c641e7fe40b4da87acf3da1dbd42fbcc3630e8851f8f1bc8ad636f9813a7332e9aa3b4082e39df682d3b35c99a6a4059aae08