Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 20:27
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-10_69acdd0fd75e6c5c6dbae19f58ee0f6d_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-10_69acdd0fd75e6c5c6dbae19f58ee0f6d_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-10_69acdd0fd75e6c5c6dbae19f58ee0f6d_cryptolocker.exe
-
Size
41KB
-
MD5
69acdd0fd75e6c5c6dbae19f58ee0f6d
-
SHA1
1eaed23374e373d004b701f9ba6678342b54686a
-
SHA256
cadef3502b6f8c4494a38d8c66eb02f6c90e33110edf26b74d5ceb03726cf2a7
-
SHA512
4a5bca27d22a6aee1d7b98c41f0820e372c66917f543e88c12493858b8c52faf76b90b86d24223e97ee2578c50833d12de23fb5886792a284db0176859723e71
-
SSDEEP
384:60VkMq01bJ3wtEwPS8HLEh+Jagz+3be+26aIIcVRYpetOOtEvwDpjqIGRmdHzOOe:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqh6/w
Malware Config
Signatures
-
Detection of CryptoLocker Variants 6 IoCs
resource yara_rule behavioral1/memory/3048-0-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000d00000000e655-11.dat CryptoLocker_rule2 behavioral1/memory/3048-13-0x0000000002380000-0x000000000238F000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2716-17-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral1/memory/3048-15-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2716-28-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 6 IoCs
resource yara_rule behavioral1/memory/3048-0-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral1/files/0x000d00000000e655-11.dat CryptoLocker_set1 behavioral1/memory/3048-13-0x0000000002380000-0x000000000238F000-memory.dmp CryptoLocker_set1 behavioral1/memory/2716-17-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral1/memory/3048-15-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral1/memory/2716-28-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 -
Detects executables built or packed with MPress PE compressor 5 IoCs
resource yara_rule behavioral1/memory/3048-0-0x0000000000500000-0x000000000050F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/files/0x000d00000000e655-11.dat INDICATOR_EXE_Packed_MPress behavioral1/memory/2716-17-0x0000000000500000-0x000000000050F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/3048-15-0x0000000000500000-0x000000000050F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2716-28-0x0000000000500000-0x000000000050F000-memory.dmp INDICATOR_EXE_Packed_MPress -
Executes dropped EXE 1 IoCs
pid Process 2716 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 3048 2024-04-10_69acdd0fd75e6c5c6dbae19f58ee0f6d_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2716 3048 2024-04-10_69acdd0fd75e6c5c6dbae19f58ee0f6d_cryptolocker.exe 28 PID 3048 wrote to memory of 2716 3048 2024-04-10_69acdd0fd75e6c5c6dbae19f58ee0f6d_cryptolocker.exe 28 PID 3048 wrote to memory of 2716 3048 2024-04-10_69acdd0fd75e6c5c6dbae19f58ee0f6d_cryptolocker.exe 28 PID 3048 wrote to memory of 2716 3048 2024-04-10_69acdd0fd75e6c5c6dbae19f58ee0f6d_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-10_69acdd0fd75e6c5c6dbae19f58ee0f6d_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-10_69acdd0fd75e6c5c6dbae19f58ee0f6d_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD58f5918713b6d2ae297cc6705c64a8bb2
SHA1656e0fdbf57d81aa4faf346c2e135292f655cf34
SHA256c80ca24d4b30c8dca1fa6551235f9489a6ced052ef37d2ce478201925d388f7d
SHA512d47189ec52e2f079149c68ccdb5e30d3d7ea09abf403e0c0488f45404ca84cf14475347db0e0c83c8b1efafbcb0c07e646fb761f7d121e7fbfcc36f6ae87dcb3