Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/02/2024, 15:32
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-25_3db84aadb21fff74bfe22427c45855d9_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-25_3db84aadb21fff74bfe22427c45855d9_cryptolocker.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-25_3db84aadb21fff74bfe22427c45855d9_cryptolocker.exe
-
Size
41KB
-
MD5
3db84aadb21fff74bfe22427c45855d9
-
SHA1
c1aec3832d64760a68fd9378db91f3b0ac1d7f8e
-
SHA256
a2e00854ac16e03c5ec8fe5f7fc3f3ce38c5d69d57d86edc58857ca6d4103fd5
-
SHA512
6b224cde22bd0fddcb39127aa92f18a9b55da9b335f6481b88913fe5453264171e9037fbdb8a3c575fcb24f29a349ac316a683210d800b12afe43a3c68c053a9
-
SSDEEP
768:UEEmoQDj/xnMp+yptndwe/PWQtOOtEvwDpjLenQL3bT1:ZzFbxmLPWQMOtEvwDpjLeU3d
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000d000000012267-11.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2992 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1708 2024-02-25_3db84aadb21fff74bfe22427c45855d9_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2992 1708 2024-02-25_3db84aadb21fff74bfe22427c45855d9_cryptolocker.exe 28 PID 1708 wrote to memory of 2992 1708 2024-02-25_3db84aadb21fff74bfe22427c45855d9_cryptolocker.exe 28 PID 1708 wrote to memory of 2992 1708 2024-02-25_3db84aadb21fff74bfe22427c45855d9_cryptolocker.exe 28 PID 1708 wrote to memory of 2992 1708 2024-02-25_3db84aadb21fff74bfe22427c45855d9_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-25_3db84aadb21fff74bfe22427c45855d9_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-25_3db84aadb21fff74bfe22427c45855d9_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5b418f22fecba6876a8240e0e857f8b3a
SHA1e0ca2c083f579c3bc198900575e10ca36b27a641
SHA2567ccb11c3e44960e35d9020d41545fc70cf9809da7b0d4edefdeede09e6c3ab7c
SHA512811082e13e5d9681b7ced660409f3996649d5b01e2f2cdf0a9a4341f725af3723211869e65efe5adb8e223a66c8b3d3d8ab723f58b237a5953652841a6b3d90f