Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/03/2024, 06:23
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-10_067ec871897eb186181731887a2b5170_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-10_067ec871897eb186181731887a2b5170_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-10_067ec871897eb186181731887a2b5170_cryptolocker.exe
-
Size
39KB
-
MD5
067ec871897eb186181731887a2b5170
-
SHA1
3adc59ae7da5bd5c6597f515ee70e431de4ca18b
-
SHA256
8a935cc2d1bdae0df30333e17cd3165c7da5c9c01b0a28abfef4e9054bf8764f
-
SHA512
c452e1f5b1793f1ebd0c1973802e16dd238472bd211c4b9c5b029d92267e9a682b65f1111d259e58ef45253d1d02b99ec3a0e9d1cbbd47f804c6b0ebc14a9d02
-
SSDEEP
768:UEEmoQDj/xnMp+yptndwe/PWQtOOtEvwDpjLenQL3bTo:ZzFbxmLPWQMOtEvwDpjLeU3g
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000c0000000122c3-11.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 3004 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2060 2024-03-10_067ec871897eb186181731887a2b5170_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2060 wrote to memory of 3004 2060 2024-03-10_067ec871897eb186181731887a2b5170_cryptolocker.exe 28 PID 2060 wrote to memory of 3004 2060 2024-03-10_067ec871897eb186181731887a2b5170_cryptolocker.exe 28 PID 2060 wrote to memory of 3004 2060 2024-03-10_067ec871897eb186181731887a2b5170_cryptolocker.exe 28 PID 2060 wrote to memory of 3004 2060 2024-03-10_067ec871897eb186181731887a2b5170_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-10_067ec871897eb186181731887a2b5170_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-10_067ec871897eb186181731887a2b5170_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:3004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD5428390b5852bc0ad7b829a0e19d9a4a2
SHA12ec6170ba515d9e2dddeced24fe808d4c9f267a3
SHA256939a9608358e62e1fcf0d2c76a1212afa4715ce830157acf439b34337aa236b7
SHA5121a797a0d4532146c5c1073095cb8faeecb3c03761901a9e6e0010e9a15dd95b755530098b6a77b0d9ec5a71e9b9fdff5224bea313d708412473ad8c72f3a9178