Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
29/04/2024, 19:56
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-29_c87d8fc8c7e2ce5763622e187f1a8f8e_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-04-29_c87d8fc8c7e2ce5763622e187f1a8f8e_cryptolocker.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-04-29_c87d8fc8c7e2ce5763622e187f1a8f8e_cryptolocker.exe
-
Size
36KB
-
MD5
c87d8fc8c7e2ce5763622e187f1a8f8e
-
SHA1
f3a023d5b24f34c98a13e0acbcc4dd1c2e0de8e2
-
SHA256
5ff3f27d80bc007a714ae5731ebe0363a05063950f7e16f5d1eb0cc474143b55
-
SHA512
2146e2d75ea1f0098bf23b563e11ce92f2fae8cc85040bb8f6b408527bc0149357d315617263f650634d0ab9092d25db27d5cb0158f04dba8e72da23aec3ceb5
-
SSDEEP
768:fTz7y3lhsT+hs1SQtOOtEvwDpjfAu9+4k:fT+hsMQMOtEvwDpjoIHk
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x00080000000122bf-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x00080000000122bf-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2516 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1600 2024-04-29_c87d8fc8c7e2ce5763622e187f1a8f8e_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1600 wrote to memory of 2516 1600 2024-04-29_c87d8fc8c7e2ce5763622e187f1a8f8e_cryptolocker.exe 28 PID 1600 wrote to memory of 2516 1600 2024-04-29_c87d8fc8c7e2ce5763622e187f1a8f8e_cryptolocker.exe 28 PID 1600 wrote to memory of 2516 1600 2024-04-29_c87d8fc8c7e2ce5763622e187f1a8f8e_cryptolocker.exe 28 PID 1600 wrote to memory of 2516 1600 2024-04-29_c87d8fc8c7e2ce5763622e187f1a8f8e_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-29_c87d8fc8c7e2ce5763622e187f1a8f8e_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-29_c87d8fc8c7e2ce5763622e187f1a8f8e_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD53f761a9f791c10b90369718a7695646e
SHA16a7629a58ab982e788a903e2f97442ffb6b3bda2
SHA2565a6b76bf3a21a0b77201e4fff9a135a973f64794bcef9c7de38434195f54a9cd
SHA512d89f38b9b1740c26a88506276b1eb85631ee763b10407a0d24a9914cc08262ff485dd8437c0b19c67a19ec7318da36cba2b4b6483d33240cd55358ffee73ef4b