Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-03-2024 10:36
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-08_49f547584ecb8306f826a6c5a541a56d_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-08_49f547584ecb8306f826a6c5a541a56d_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-03-08_49f547584ecb8306f826a6c5a541a56d_cryptolocker.exe
-
Size
127KB
-
MD5
49f547584ecb8306f826a6c5a541a56d
-
SHA1
c0688f25565ccca63f0dec8ace8da2ead28bd747
-
SHA256
0c9b838f363454d3c3c638ffd08f52c8532130aa77c6b4073e77511e737ef546
-
SHA512
4f8181926a81f3a63232fd9e95d9b3a0a9eee126b55f26f5ce0afda9dba10d3074e33d52fd577a8619020a87dba02dd97ee08a3b1212a14ef13ac02ef26f8851
-
SSDEEP
1536:gUj+AIMOtEvwDpjNbwQEIPlemUhYwkkxGBp5:vCA9OtEvwDpj1
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000c000000012248-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000c000000012248-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 1548 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1312 2024-03-08_49f547584ecb8306f826a6c5a541a56d_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1312 wrote to memory of 1548 1312 2024-03-08_49f547584ecb8306f826a6c5a541a56d_cryptolocker.exe 28 PID 1312 wrote to memory of 1548 1312 2024-03-08_49f547584ecb8306f826a6c5a541a56d_cryptolocker.exe 28 PID 1312 wrote to memory of 1548 1312 2024-03-08_49f547584ecb8306f826a6c5a541a56d_cryptolocker.exe 28 PID 1312 wrote to memory of 1548 1312 2024-03-08_49f547584ecb8306f826a6c5a541a56d_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-08_49f547584ecb8306f826a6c5a541a56d_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-08_49f547584ecb8306f826a6c5a541a56d_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:1548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
127KB
MD50b336e221d5b4b586215e1d4f09b2e1e
SHA1ac23c5c2a4ec37209b0853cb53427abdf8d2e1cc
SHA2562da0a2131a6a6dc843e2ccd19ee3da24af6539a95a1ac10bad67e2f136cf3722
SHA512b643d76ff70808cd84de1c4f2086447459d281e66fd3d7b0f4bce57b7727f62ee01b6217ca8a18cc41c16ed6ea8c1985f47b7b858b82f021a239fd6300988a4d