Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/03/2024, 03:45
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-29_e46a4200ed64c154cf3fd82cbb38dce9_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-29_e46a4200ed64c154cf3fd82cbb38dce9_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-29_e46a4200ed64c154cf3fd82cbb38dce9_cryptolocker.exe
-
Size
91KB
-
MD5
e46a4200ed64c154cf3fd82cbb38dce9
-
SHA1
3e21042ddc67b983244ebe3d917e801b429f9009
-
SHA256
a1a2440e1544d04654c23bcde7b8e75ea244501b44963af2f1f26448eb999fb5
-
SHA512
2b21d017cf71eded900788ec5c47f7a2a5a09636e59b6571d630b38f686447440a8512444ad111d145e86d02880c09755707adaa0ea3bbce483715c026b231ab
-
SSDEEP
1536:vj+jsMQMOtEvwDpj5H8u8rBN6nqEZNi1OkQNmvz:vCjsIOtEvwDpj5H8zPse
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000800000001227d-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000800000001227d-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2128 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1916 2024-03-29_e46a4200ed64c154cf3fd82cbb38dce9_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2128 1916 2024-03-29_e46a4200ed64c154cf3fd82cbb38dce9_cryptolocker.exe 28 PID 1916 wrote to memory of 2128 1916 2024-03-29_e46a4200ed64c154cf3fd82cbb38dce9_cryptolocker.exe 28 PID 1916 wrote to memory of 2128 1916 2024-03-29_e46a4200ed64c154cf3fd82cbb38dce9_cryptolocker.exe 28 PID 1916 wrote to memory of 2128 1916 2024-03-29_e46a4200ed64c154cf3fd82cbb38dce9_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_e46a4200ed64c154cf3fd82cbb38dce9_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-29_e46a4200ed64c154cf3fd82cbb38dce9_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2128
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD55282388439395b3a3b281c9b0d365bfa
SHA1d65297659527d2298e6e6f11fc38cf886898d1f2
SHA25656ea30f604fca1a9fa97e7e35e01e6812e6c70ea08fbe3fafff7eb67448a7380
SHA512a1b06c83af97bac23224392ab3f386f7a7e4be30f5c1520f4cef8dc92cff01cee467b2727deba8f6f4e85293b550aaa1dea4d1b6fcd72b76bc852b5b35e35b7e