Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/03/2024, 23:39
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-07_b5ac90d675555e9298fe451d411b9f5a_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-07_b5ac90d675555e9298fe451d411b9f5a_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-03-07_b5ac90d675555e9298fe451d411b9f5a_cryptolocker.exe
-
Size
40KB
-
MD5
b5ac90d675555e9298fe451d411b9f5a
-
SHA1
a32e5b15a80eb24d8e6f3477d1d3b17b39ba6532
-
SHA256
4059e1084b7e064ba456a1d6220d690b58ed709ce26dbda959a8f2124459e089
-
SHA512
cd16a202148331d0e5d2fe1a14a2b971a6b4ddf199800d32e2bdd800919acc7b45ce9b4991df25ea32f156a092961785c0ebfc530e9b94755e7462e8c86b932a
-
SSDEEP
768:vQz7yVEhs9+js1SQtOOtEvwDpjz9+4REL+cc660SV:vj+jsMQMOtEvwDpj5HW5E
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000b000000013a06-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000b000000013a06-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 1728 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2844 2024-03-07_b5ac90d675555e9298fe451d411b9f5a_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2844 wrote to memory of 1728 2844 2024-03-07_b5ac90d675555e9298fe451d411b9f5a_cryptolocker.exe 28 PID 2844 wrote to memory of 1728 2844 2024-03-07_b5ac90d675555e9298fe451d411b9f5a_cryptolocker.exe 28 PID 2844 wrote to memory of 1728 2844 2024-03-07_b5ac90d675555e9298fe451d411b9f5a_cryptolocker.exe 28 PID 2844 wrote to memory of 1728 2844 2024-03-07_b5ac90d675555e9298fe451d411b9f5a_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_b5ac90d675555e9298fe451d411b9f5a_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-07_b5ac90d675555e9298fe451d411b9f5a_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:1728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5c0d1fe3d95e9faa8fe8b4fc47bdb8a12
SHA12fc9ee89d13b7016aa96ce6a7ce3f6c8d2c8bba8
SHA25663bf32cba5389fb568bbe9e294502f2510413294cf784a1ae8a02ad1daaf0d73
SHA5124877b55534f3806979f79962a0ea03ae35f7a16943941ed10413d97c95410b5a0ef37769c557e703a07fa6cfe7fad3a2c2aeb871769ba5af96857d9b495cecfe