Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/04/2024, 17:28
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-27_08cea536e72c2f443a53419beada146b_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-27_08cea536e72c2f443a53419beada146b_cryptolocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-04-27_08cea536e72c2f443a53419beada146b_cryptolocker.exe
-
Size
41KB
-
MD5
08cea536e72c2f443a53419beada146b
-
SHA1
94abd01bc6d45aac901e8a643328a22285326c4f
-
SHA256
0b0e57dcf990ec6cd396b7fc6432904e51167321ca1914209c296d0215ce92a1
-
SHA512
b84bfca052d9446f7bad50f748baa7217ccdd7c4daa6a448abfa4b19852ad290528e6d6a73f6c23bfc07cc0b4ae3817374f127dbba9419274e8ec3f49fd50121
-
SSDEEP
384:60VkMq01bJ3wtEwPS8HLEh+Jagz+3be+26aIIcVRYpetOOtEvwDpjqIGRmdHzOOO:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqh6/w
Malware Config
Signatures
-
Detection of CryptoLocker Variants 4 IoCs
resource yara_rule behavioral1/memory/2340-0-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000c0000000146fc-11.dat CryptoLocker_rule2 behavioral1/memory/2340-15-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2520-25-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 4 IoCs
resource yara_rule behavioral1/memory/2340-0-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral1/files/0x000c0000000146fc-11.dat CryptoLocker_set1 behavioral1/memory/2340-15-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral1/memory/2520-25-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 -
Detects executables built or packed with MPress PE compressor 4 IoCs
resource yara_rule behavioral1/memory/2340-0-0x0000000000500000-0x000000000050F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/files/0x000c0000000146fc-11.dat INDICATOR_EXE_Packed_MPress behavioral1/memory/2340-15-0x0000000000500000-0x000000000050F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2520-25-0x0000000000500000-0x000000000050F000-memory.dmp INDICATOR_EXE_Packed_MPress -
Executes dropped EXE 1 IoCs
pid Process 2520 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2340 2024-04-27_08cea536e72c2f443a53419beada146b_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2340 wrote to memory of 2520 2340 2024-04-27_08cea536e72c2f443a53419beada146b_cryptolocker.exe 28 PID 2340 wrote to memory of 2520 2340 2024-04-27_08cea536e72c2f443a53419beada146b_cryptolocker.exe 28 PID 2340 wrote to memory of 2520 2340 2024-04-27_08cea536e72c2f443a53419beada146b_cryptolocker.exe 28 PID 2340 wrote to memory of 2520 2340 2024-04-27_08cea536e72c2f443a53419beada146b_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-27_08cea536e72c2f443a53419beada146b_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-27_08cea536e72c2f443a53419beada146b_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5f5dc2ab35b009021d893efdd2e006db2
SHA10c257df1bef7a1c54b9d62f5b1c7c7e3e83c99cb
SHA256c1fcb2e8bf721619b935b0679321e653154c789103d03b05d98e2547ab139a61
SHA5127bebd92a0f6bb23530ba5badfe4c477d072a4b17d48e61a57c15d33c7be658cf35882c223eae6fbc8f7cde102c526f520509ebe4b82e2dc80659479dacc4f192