Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/04/2024, 09:38
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-06_5065a907cc86cf753c45027aee9a267a_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-06_5065a907cc86cf753c45027aee9a267a_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-06_5065a907cc86cf753c45027aee9a267a_cryptolocker.exe
-
Size
127KB
-
MD5
5065a907cc86cf753c45027aee9a267a
-
SHA1
ca44755ae1016b9a500224adab5a5030535a6792
-
SHA256
173286905888a3a9ac4a5ffbe33e956034325848db832e82ffa7d423b7c9d5b3
-
SHA512
b605f9bd7d2610d155a1759572fd3cd325fb3bda8da5e3cf65f5e9b0f14f2d21a09690d3fc08be103bfb6b0cc70b26386c321247b767d18762cd380bc6ac767e
-
SSDEEP
1536:gUj+AIMOtEvwDpjNbwQEIPlemUhYwkkxGBpB:vCA9OtEvwDpj9
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000b00000001224f-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000b00000001224f-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 1636 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2812 2024-04-06_5065a907cc86cf753c45027aee9a267a_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2812 wrote to memory of 1636 2812 2024-04-06_5065a907cc86cf753c45027aee9a267a_cryptolocker.exe 28 PID 2812 wrote to memory of 1636 2812 2024-04-06_5065a907cc86cf753c45027aee9a267a_cryptolocker.exe 28 PID 2812 wrote to memory of 1636 2812 2024-04-06_5065a907cc86cf753c45027aee9a267a_cryptolocker.exe 28 PID 2812 wrote to memory of 1636 2812 2024-04-06_5065a907cc86cf753c45027aee9a267a_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-06_5065a907cc86cf753c45027aee9a267a_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-06_5065a907cc86cf753c45027aee9a267a_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:1636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD59be7a1883efe1c2ea03c3a8326937ee8
SHA16043fb68bc265a2de97fd88b3a0cad0db29d281c
SHA25652e757b758fb9630dbf51ab119d0e947438ccdf2538a4cf36098dd9325a568e5
SHA51237044279211c59e78fe4ba0318e830213b10c28086adb565b63a9696d67ceef3abee06b3cdf78c8b95caccb29366866f72d883c8a00c321f0e340100be18a442