Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
15/04/2024, 14:32
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-15_3720cf57d16e0c2409d49ee40f21c545_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-04-15_3720cf57d16e0c2409d49ee40f21c545_cryptolocker.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-15_3720cf57d16e0c2409d49ee40f21c545_cryptolocker.exe
-
Size
45KB
-
MD5
3720cf57d16e0c2409d49ee40f21c545
-
SHA1
a63a9bb86e13c93a9425d06fd6ea1057675095b6
-
SHA256
6484dfbc33104b13044eae024a4c9f56a308fce620c5c31afa8354a32f8a85aa
-
SHA512
75b3a881f1377f19c822136f4a3bac97235203a6f66c7c7f162eac44a4696f36c950a2907b1211fedefb3a75745b1737cb7de4a77d1362c2417b68f206dbf8b2
-
SSDEEP
768:vQz7yVEhs9+js1SQtOOtEvwDpjz9+4/Uth8igNrr46xdUUuj2e:vj+jsMQMOtEvwDpj5Hczer5ixjn
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x00090000000122be-13.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x00090000000122be-13.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2192 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1732 2024-04-15_3720cf57d16e0c2409d49ee40f21c545_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2192 1732 2024-04-15_3720cf57d16e0c2409d49ee40f21c545_cryptolocker.exe 28 PID 1732 wrote to memory of 2192 1732 2024-04-15_3720cf57d16e0c2409d49ee40f21c545_cryptolocker.exe 28 PID 1732 wrote to memory of 2192 1732 2024-04-15_3720cf57d16e0c2409d49ee40f21c545_cryptolocker.exe 28 PID 1732 wrote to memory of 2192 1732 2024-04-15_3720cf57d16e0c2409d49ee40f21c545_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_3720cf57d16e0c2409d49ee40f21c545_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-15_3720cf57d16e0c2409d49ee40f21c545_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2192
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5be21b870e7eb7b0b4035ff00cf2efcc9
SHA1eef8098cd7aaa55c2166ddff6a737c8885b89ce7
SHA2565518e463f02199d9a954cd14460afdcc4c252f8c805cf91f674c869afe1aef4a
SHA512848d0cd9db6aa4d36178f13b044a984f46b0f4c17eb8ea00159a2cf46fb46e21f9295a012f0553ad6f53ce680d996805bc64e0065d13c33ba298a678f04c12aa