Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 10:12
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-15_eebee3f74ac506fa673c8e064c500ef3_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-03-15_eebee3f74ac506fa673c8e064c500ef3_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-03-15_eebee3f74ac506fa673c8e064c500ef3_cryptolocker.exe
-
Size
40KB
-
MD5
eebee3f74ac506fa673c8e064c500ef3
-
SHA1
64de5ab7364a7e18dddcd8c36dec3f4274df3021
-
SHA256
387f26278ff0113f6bdeb3f036faebef3ed4bf6199ee12d78a1312c72cac4f90
-
SHA512
081f79d8a6f2ab5a48d16409e9ce62214f5c2690458dbf9419ae29f19920041d9577527f71009b529f797aa14b001896e5c500a7309b7ec8f32f09c23f6c29d5
-
SSDEEP
768:vQz7yVEhs9+js1SQtOOtEvwDpjz9+4tKM3Az5mRD:vj+jsMQMOtEvwDpj5Ht13A4RD
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x00090000000122be-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x00090000000122be-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2004 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2896 2024-03-15_eebee3f74ac506fa673c8e064c500ef3_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2896 wrote to memory of 2004 2896 2024-03-15_eebee3f74ac506fa673c8e064c500ef3_cryptolocker.exe 28 PID 2896 wrote to memory of 2004 2896 2024-03-15_eebee3f74ac506fa673c8e064c500ef3_cryptolocker.exe 28 PID 2896 wrote to memory of 2004 2896 2024-03-15_eebee3f74ac506fa673c8e064c500ef3_cryptolocker.exe 28 PID 2896 wrote to memory of 2004 2896 2024-03-15_eebee3f74ac506fa673c8e064c500ef3_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-15_eebee3f74ac506fa673c8e064c500ef3_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-15_eebee3f74ac506fa673c8e064c500ef3_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5a1545069165e8c34443407dfb27625f6
SHA14e122527a9065054ef85c5ed1b3efd0d5a8ca19b
SHA256050b7b72f6a3a7eb659d86cf13b47f994b8a4a3b1f5e32d2e01a7f75f7e2c95f
SHA512a3bb41d0cf3195a99cdae7ed3f025949114cd8a628b099db32fc45df0b41c8d5b69a65ca651f006b2f717aec21324e98647e2f3b41b3fe9180822ab43eb91c11