Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/03/2024, 19:27
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-25_45cd6be70de770101ce88cf6b5555e35_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-25_45cd6be70de770101ce88cf6b5555e35_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-25_45cd6be70de770101ce88cf6b5555e35_cryptolocker.exe
-
Size
129KB
-
MD5
45cd6be70de770101ce88cf6b5555e35
-
SHA1
69a4e612714f192c09951dfedbff179dad950ce2
-
SHA256
de7b25862ed10bb720a3ec68f3e8a16cca61863574b070e048508f55689aec8e
-
SHA512
49bbfe3caccd198ce9bb4e633d4fd2749612ef684753179f55dcf7e2bdb84055fae5de21331e5cf719b21fcbc52c31c86b105ac833799c0aa3508df96f8a773f
-
SSDEEP
1536:vj+jsMQMOtEvwDpj5HwYYTjipvF2hBfIuBKLUYOVbvh//O:vCjsIOtEvwDpj5H9YvQd2Rc
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000c0000000122f2-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000c0000000122f2-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2504 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2224 2024-03-25_45cd6be70de770101ce88cf6b5555e35_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2504 2224 2024-03-25_45cd6be70de770101ce88cf6b5555e35_cryptolocker.exe 28 PID 2224 wrote to memory of 2504 2224 2024-03-25_45cd6be70de770101ce88cf6b5555e35_cryptolocker.exe 28 PID 2224 wrote to memory of 2504 2224 2024-03-25_45cd6be70de770101ce88cf6b5555e35_cryptolocker.exe 28 PID 2224 wrote to memory of 2504 2224 2024-03-25_45cd6be70de770101ce88cf6b5555e35_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-25_45cd6be70de770101ce88cf6b5555e35_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-25_45cd6be70de770101ce88cf6b5555e35_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129KB
MD58003e8650e9e53c4f14310a2c4f3e4d1
SHA128be3b67a7fcfdd542fb7a5dae4af1e51c6d1455
SHA256c1aaa745bc185988cb6b25795d3e7a32dc2efc0d1314d6e6b50e428f6d06605d
SHA5121b470d438b0c9649ab912a146b5e47f0b18730afb534d427857fa1859c60082b9d84fca7c3b8270455bb5f0ccf92c6c996d4697b6fc668174ecff820a1289769