Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/04/2024, 08:28
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-26_9749a6f1af1757b24651132caa3e1f51_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-26_9749a6f1af1757b24651132caa3e1f51_cryptolocker.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-26_9749a6f1af1757b24651132caa3e1f51_cryptolocker.exe
-
Size
36KB
-
MD5
9749a6f1af1757b24651132caa3e1f51
-
SHA1
85e84b994589decce315152c971c2706bcc9a1c5
-
SHA256
cd9efc0eebd4f7eb532723f9c21d888bfe81053a81abb7261660269275c64cae
-
SHA512
8b5a61f7ad6bdca2e80824417829b6366243ed0ff5177c3de6fbf089112d4145cec81ee2ef032888d30ab79fa7445a91fbe55e18f3a449d1a560bc5a0914b978
-
SSDEEP
768:fTz7y3lhsT+hs1SQtOOtEvwDpjfAu9+4/u:fT+hsMQMOtEvwDpjoIHm
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000b000000012256-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000b000000012256-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2392 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2736 2024-04-26_9749a6f1af1757b24651132caa3e1f51_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2736 wrote to memory of 2392 2736 2024-04-26_9749a6f1af1757b24651132caa3e1f51_cryptolocker.exe 28 PID 2736 wrote to memory of 2392 2736 2024-04-26_9749a6f1af1757b24651132caa3e1f51_cryptolocker.exe 28 PID 2736 wrote to memory of 2392 2736 2024-04-26_9749a6f1af1757b24651132caa3e1f51_cryptolocker.exe 28 PID 2736 wrote to memory of 2392 2736 2024-04-26_9749a6f1af1757b24651132caa3e1f51_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-26_9749a6f1af1757b24651132caa3e1f51_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-26_9749a6f1af1757b24651132caa3e1f51_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5183403d0ecb563df81a23011ccaed13d
SHA12644a635b2ecdd90ea1d176bb98ad4be1da62e24
SHA256fb9a3645d372b15b7f7c56e36b78b3c3f330a5ad61ee6135a09d80d0450b9896
SHA5122a48f22295b607095bfbf2c47b9d057512c2a937183b927d45d2908dc69f56d3ca53fdb5fe699df84a78893afcb0f16fbf41d7b54ccbfb9cdb0f6817871edc01