Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-03-2024 17:35
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-19_514abb0596d5e4f063c3e02f0c664728_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-19_514abb0596d5e4f063c3e02f0c664728_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-19_514abb0596d5e4f063c3e02f0c664728_cryptolocker.exe
-
Size
121KB
-
MD5
514abb0596d5e4f063c3e02f0c664728
-
SHA1
fb81fb25b4b743c07e2d5f7acbcb543379500e98
-
SHA256
debf452de2c61b19facf0497daed03dbabb96288f6bc9aa54525654356a1dd74
-
SHA512
43ac6b5a49f43e82a0702156f3f9dd251c7182d62de58429c97073ca5b7e03d58a607a8a9cc70f21931f49f4b81b3a39ba3a40f3f7e345cbe2c6e5efb9a9fdd4
-
SSDEEP
768:gUQz7yVEhs9+4T/1bytOOtEvwDpjNbZ7uyA36S7MpxRIIXVe3mU9TYwlOBT2e+:gUj+AIMOtEvwDpjNbwQEIPlemUhYmJ
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000a000000012254-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000a000000012254-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2488 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 3048 2024-03-19_514abb0596d5e4f063c3e02f0c664728_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2488 3048 2024-03-19_514abb0596d5e4f063c3e02f0c664728_cryptolocker.exe 28 PID 3048 wrote to memory of 2488 3048 2024-03-19_514abb0596d5e4f063c3e02f0c664728_cryptolocker.exe 28 PID 3048 wrote to memory of 2488 3048 2024-03-19_514abb0596d5e4f063c3e02f0c664728_cryptolocker.exe 28 PID 3048 wrote to memory of 2488 3048 2024-03-19_514abb0596d5e4f063c3e02f0c664728_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_514abb0596d5e4f063c3e02f0c664728_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-19_514abb0596d5e4f063c3e02f0c664728_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
121KB
MD5bfe94132a32937e30ba028e8713cc97b
SHA19850d3ecd12bf33b6cee4756f302b2c392211df7
SHA25690058e0eee96c509ab2243bf5b5105ddbd7ae279ed97b920f9f9d1f1cb316d7f
SHA51226c074ebaf04710440319faa35960928d4913dd095fdba7cb92de34e9ad50865e42c559d97117d95ee32e61749e30f84dae92b0895ebbb4afc70a57ce5f1ed2d