Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23/02/2024, 06:57
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-23_ba4cc6f80a554eb3f5012bcd0671c913_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-23_ba4cc6f80a554eb3f5012bcd0671c913_cryptolocker.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-23_ba4cc6f80a554eb3f5012bcd0671c913_cryptolocker.exe
-
Size
64KB
-
MD5
ba4cc6f80a554eb3f5012bcd0671c913
-
SHA1
73a4cc719ecb5f16a647ff6f01e121af9f53757d
-
SHA256
a894f7a349ef6a665d99d1f36a829b7776ccba400ffdafef25397293548e0f7c
-
SHA512
210bab4679273a74e78a79ab4691540b5114e06d4f23382eaffd0c87709c804f4c7e2be2251dee97c6574ca34181256faf1a0f0be173d8eb7b0d118078837c7a
-
SSDEEP
768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqPOYRmNxt5I52kGEpE0P/xtP:6j+1NMOtEvwDpjr8ox8UDEpN/rP
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral1/memory/2456-0-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x0008000000012262-11.dat CryptoLocker_rule2 behavioral1/memory/2456-15-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2516-16-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2516-25-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 5 IoCs
resource yara_rule behavioral1/memory/2456-0-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral1/files/0x0008000000012262-11.dat CryptoLocker_set1 behavioral1/memory/2456-15-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral1/memory/2516-16-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral1/memory/2516-25-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 -
Detects executables built or packed with MPress PE compressor 5 IoCs
resource yara_rule behavioral1/memory/2456-0-0x0000000000500000-0x000000000050F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/files/0x0008000000012262-11.dat INDICATOR_EXE_Packed_MPress behavioral1/memory/2456-15-0x0000000000500000-0x000000000050F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2516-16-0x0000000000500000-0x000000000050F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2516-25-0x0000000000500000-0x000000000050F000-memory.dmp INDICATOR_EXE_Packed_MPress -
Executes dropped EXE 1 IoCs
pid Process 2516 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2456 2024-02-23_ba4cc6f80a554eb3f5012bcd0671c913_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2456 wrote to memory of 2516 2456 2024-02-23_ba4cc6f80a554eb3f5012bcd0671c913_cryptolocker.exe 28 PID 2456 wrote to memory of 2516 2456 2024-02-23_ba4cc6f80a554eb3f5012bcd0671c913_cryptolocker.exe 28 PID 2456 wrote to memory of 2516 2456 2024-02-23_ba4cc6f80a554eb3f5012bcd0671c913_cryptolocker.exe 28 PID 2456 wrote to memory of 2516 2456 2024-02-23_ba4cc6f80a554eb3f5012bcd0671c913_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-23_ba4cc6f80a554eb3f5012bcd0671c913_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-23_ba4cc6f80a554eb3f5012bcd0671c913_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD510bbe9f4ff7c92a1ccc6bdf208b23391
SHA102711a9e7c939447a1c4c78483109d30a40ba161
SHA256a712dd8c18b0f6b5140e8d7d0d2d5cfcee99d6226b47de7e915e430c38564653
SHA51200cf65a84bcc52637cac50facebc02daf385fdd204e4d160f28869ae318edb1bdbfc9c4f52519305e41d9ffe3806e84dee6c9f7df128d30ad6b4fde864d61652