Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/04/2024, 12:58
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-08_ff6021d7d1317b2edd4a581e16f4952b_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-08_ff6021d7d1317b2edd4a581e16f4952b_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-08_ff6021d7d1317b2edd4a581e16f4952b_cryptolocker.exe
-
Size
125KB
-
MD5
ff6021d7d1317b2edd4a581e16f4952b
-
SHA1
8a429a911bf6c9e939e926b5fb7e4b759ff93e3a
-
SHA256
7ae0a262a472b0d8925414c815562f8e42fb0e166849b623778a2e7b481190b4
-
SHA512
c915315fe5be35f84b0a889e78dc084c6dd0ee3a4ad69e8ea239cb8cd5a2cc8eabd178c9939840dca6c31fb94055f99a77f55478c0304f3bef8e3e63bf8e1bcf
-
SSDEEP
1536:gUj+AIMOtEvwDpjNbwQEIPlemUhYwkkxGBp3:vCA9OtEvwDpjb
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000900000001227e-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000900000001227e-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2600 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1724 2024-04-08_ff6021d7d1317b2edd4a581e16f4952b_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2600 1724 2024-04-08_ff6021d7d1317b2edd4a581e16f4952b_cryptolocker.exe 28 PID 1724 wrote to memory of 2600 1724 2024-04-08_ff6021d7d1317b2edd4a581e16f4952b_cryptolocker.exe 28 PID 1724 wrote to memory of 2600 1724 2024-04-08_ff6021d7d1317b2edd4a581e16f4952b_cryptolocker.exe 28 PID 1724 wrote to memory of 2600 1724 2024-04-08_ff6021d7d1317b2edd4a581e16f4952b_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-08_ff6021d7d1317b2edd4a581e16f4952b_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-08_ff6021d7d1317b2edd4a581e16f4952b_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
126KB
MD555587612512e44a7225e860aedb85d3c
SHA1b4fcd3efcf00e27ea90c369f18607f9610162f07
SHA2565a84a9f3ce19f7e1d9df8c40ae2064ca61a8126ee587c1beb1eb8be572e90e0b
SHA5125046e56bdd781b8b21be747c1b644ee8ef9a5a637a0edc22653d4bb08242539cccfb296d81d590613d6d11aa3ca5066fa8ae81bf7cf05fdda43225a4ee7c5c21