Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 06:34
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-09_4dbb5f1cf6d96e68fbcef4bf7e00daa7_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-09_4dbb5f1cf6d96e68fbcef4bf7e00daa7_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-09_4dbb5f1cf6d96e68fbcef4bf7e00daa7_cryptolocker.exe
-
Size
89KB
-
MD5
4dbb5f1cf6d96e68fbcef4bf7e00daa7
-
SHA1
ea2e50ee27b61e1396418a294b536682d52d0cda
-
SHA256
1cb4e6946ee6758a95e2a6b2a7b0f53f9d54305c746564c51376b2704f850e6e
-
SHA512
470e39c338f5dd2b276e89a8ce1d31df7f39f2f46cab4afba29c39723b736193f777a396ba7df59618477c099080861fb177419bb45e90db6d76405aee9de5a4
-
SSDEEP
1536:vj+jsMQMOtEvwDpj5H8u8rBN6nqEZNi1OkQo3:vCjsIOtEvwDpj5H8zPss
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000c0000000122c3-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000c0000000122c3-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 1640 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2364 2024-04-09_4dbb5f1cf6d96e68fbcef4bf7e00daa7_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 1640 2364 2024-04-09_4dbb5f1cf6d96e68fbcef4bf7e00daa7_cryptolocker.exe 28 PID 2364 wrote to memory of 1640 2364 2024-04-09_4dbb5f1cf6d96e68fbcef4bf7e00daa7_cryptolocker.exe 28 PID 2364 wrote to memory of 1640 2364 2024-04-09_4dbb5f1cf6d96e68fbcef4bf7e00daa7_cryptolocker.exe 28 PID 2364 wrote to memory of 1640 2364 2024-04-09_4dbb5f1cf6d96e68fbcef4bf7e00daa7_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-09_4dbb5f1cf6d96e68fbcef4bf7e00daa7_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-09_4dbb5f1cf6d96e68fbcef4bf7e00daa7_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:1640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD5dab99aed5d611e9a6cba36e909d64105
SHA15374798760712cc3efbf79e6bb800362e32f8153
SHA256750ecf32c23877dde4437d7f113ebdf47f0472895d150e1212e0c7bb2ad454ff
SHA512e8f3ae7f43c05dbfdaff557cb35b0f16a849fd484e1a2a8b4cd2f72128402eed1ab4a36bbc39cf50cc81c5b322e1b3d2abb62169b67b637df1c1e37fe9cd698f