Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/03/2024, 20:47
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-27_ec9b7422096748b5cd01618610f15039_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-27_ec9b7422096748b5cd01618610f15039_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-27_ec9b7422096748b5cd01618610f15039_cryptolocker.exe
-
Size
37KB
-
MD5
ec9b7422096748b5cd01618610f15039
-
SHA1
9249ae3061a889c6cfba470a9c41f96a84f8b511
-
SHA256
1c59fe602e4007f048b8b80836bcd7ddd39ce83a204fe6f509687469223b3576
-
SHA512
f1dd43759fc98ffe0095d25a6271ab01861ab3d8ca500f069290766f513b88a8b5024330cb6f4f77f4c6da2e99b931b7fdaac399689e8f1560ebb02554a30126
-
SSDEEP
768:UEEmoQDj/xnMp+yptndwe/PWQtOOtEvwDpjLenUq:ZzFbxmLPWQMOtEvwDpjLeH
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000c000000012254-11.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 1720 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2204 2024-03-27_ec9b7422096748b5cd01618610f15039_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 1720 2204 2024-03-27_ec9b7422096748b5cd01618610f15039_cryptolocker.exe 28 PID 2204 wrote to memory of 1720 2204 2024-03-27_ec9b7422096748b5cd01618610f15039_cryptolocker.exe 28 PID 2204 wrote to memory of 1720 2204 2024-03-27_ec9b7422096748b5cd01618610f15039_cryptolocker.exe 28 PID 2204 wrote to memory of 1720 2204 2024-03-27_ec9b7422096748b5cd01618610f15039_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-27_ec9b7422096748b5cd01618610f15039_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-27_ec9b7422096748b5cd01618610f15039_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:1720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5b2b7974acfc685b5b6ea0c01622385f2
SHA15f09ee61d8ff42bbfbb6814cf96e6b77e719ee8a
SHA256b7a0597d82a08cca74cb8dffb7bf9ec2aa2844fc988bfc5a7c974ef048ac4518
SHA512638ac5ef126d12ccbcbf741e3744a03fc97c20abb1c96f98cd3cc9f8a466315d771e9ec700d094074f0810f386b6422625a0cce64104148c21fd3871a3e1ef09