Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-02-2024 09:32
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-22_1c6d091f06f2f9740b6ebd38bc290a88_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-22_1c6d091f06f2f9740b6ebd38bc290a88_cryptolocker.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-22_1c6d091f06f2f9740b6ebd38bc290a88_cryptolocker.exe
-
Size
60KB
-
MD5
1c6d091f06f2f9740b6ebd38bc290a88
-
SHA1
90e18428b545ea2a1b72d221a5cd93131bae5a14
-
SHA256
d3e0f37aa86f74eddb9e544330ca79d261cd95f2680fed235ac03836882242c5
-
SHA512
169513815639cb583b51adbf71389e1772723fa69648df76453db10862883d7a6974a837da271588d0cf63ecf8f8c92e39504098648fd0025dc8a75d298dc7f7
-
SSDEEP
1536:ZzFbxmLPWQMOtEvwDpj38lD/cMAT+l/N2z:ZVxkGOtEvwDpjN
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000900000001222c-11.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2012 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1100 2024-02-22_1c6d091f06f2f9740b6ebd38bc290a88_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1100 wrote to memory of 2012 1100 2024-02-22_1c6d091f06f2f9740b6ebd38bc290a88_cryptolocker.exe 28 PID 1100 wrote to memory of 2012 1100 2024-02-22_1c6d091f06f2f9740b6ebd38bc290a88_cryptolocker.exe 28 PID 1100 wrote to memory of 2012 1100 2024-02-22_1c6d091f06f2f9740b6ebd38bc290a88_cryptolocker.exe 28 PID 1100 wrote to memory of 2012 1100 2024-02-22_1c6d091f06f2f9740b6ebd38bc290a88_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-22_1c6d091f06f2f9740b6ebd38bc290a88_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-22_1c6d091f06f2f9740b6ebd38bc290a88_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD504597fe132a1280ad8f4f9546075b1cc
SHA1507d9261ba5985142f9e1c418a233d5d311c7fa1
SHA256bd000951a182c0446d2fee78874e0bd93ceaaa5980b972f500ec622229d1ffd8
SHA5121bdc3ee42719ef74df8f06dcad9ecca2c6e3c3506fa10e4bac8b639edff60c74a77ba526352868a9ca2b1f188cd0befbb5c08eb1d3315bdf9dfa82f26612919d