Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19-02-2024 05:23
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-19_08b542d583c7535096c342592c4950a0_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-19_08b542d583c7535096c342592c4950a0_cryptolocker.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-02-19_08b542d583c7535096c342592c4950a0_cryptolocker.exe
-
Size
40KB
-
MD5
08b542d583c7535096c342592c4950a0
-
SHA1
106e825f99144f94aee24adfa65924f109c84f6a
-
SHA256
447fa5d653043c5d899ba62f2f7c01aeca271e0bac4617a9cdcbb7e007919af8
-
SHA512
94c239c262ba928d24d6bb7e5f3e8762cb087714989017364685572e0782d21dbe42e8d20b37ed89c9524af6d6dfb713223f00c28a995d60ec53b8b06b342cb1
-
SSDEEP
768:UEEmoQDj/xnMp+yptndwe/PWQtOOtEvwDpjLenQLmWO9:ZzFbxmLPWQMOtEvwDpjLeUHO9
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x0008000000012248-11.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2680 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2760 2024-02-19_08b542d583c7535096c342592c4950a0_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2760 wrote to memory of 2680 2760 2024-02-19_08b542d583c7535096c342592c4950a0_cryptolocker.exe 28 PID 2760 wrote to memory of 2680 2760 2024-02-19_08b542d583c7535096c342592c4950a0_cryptolocker.exe 28 PID 2760 wrote to memory of 2680 2760 2024-02-19_08b542d583c7535096c342592c4950a0_cryptolocker.exe 28 PID 2760 wrote to memory of 2680 2760 2024-02-19_08b542d583c7535096c342592c4950a0_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-19_08b542d583c7535096c342592c4950a0_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-19_08b542d583c7535096c342592c4950a0_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5e39423e3d34311429554492f04117cc8
SHA1e957e1727b02bcdd4fffbf184198951786a39630
SHA25613e759683e9743ca6c804919dc722e8d6130dd11e716e612e214f6829a14789e
SHA512a769732d603ec7d30c097f36f4f87059753c2d26aa4d17d4f31a455cfadef45489549d7211d8618cc2e9d73db01cc1ebc3f98947f957cd3a3de28dc8c82ab29f