Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30/04/2024, 02:02
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-30_f59860bcce86b3e74ee2870169a31702_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-30_f59860bcce86b3e74ee2870169a31702_cryptolocker.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-04-30_f59860bcce86b3e74ee2870169a31702_cryptolocker.exe
-
Size
127KB
-
MD5
f59860bcce86b3e74ee2870169a31702
-
SHA1
527c738aa249fa603fbdba6aed35b5f0caed95ed
-
SHA256
fc4179b91d8139265bfd0ec5a39b426699e0561f9b721395ff2f01e4421164cf
-
SHA512
b86f7631f6576c2ad9f96ec96a76308de68ad8d436fa5a74a3d1405ca3f0b353d5b8b6aa42883f47b0b85a34d3a8547807b90219ca60c2062a750c1b44c115d5
-
SSDEEP
1536:vj+jsMQMOtEvwDpj5HwYYTjipvF2hBfIuBKLUYOVbvh//LIT8:vCjsIOtEvwDpj5H9YvQd2Rt
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000b000000014fe1-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000b000000014fe1-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2204 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2804 2024-04-30_f59860bcce86b3e74ee2870169a31702_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2804 wrote to memory of 2204 2804 2024-04-30_f59860bcce86b3e74ee2870169a31702_cryptolocker.exe 28 PID 2804 wrote to memory of 2204 2804 2024-04-30_f59860bcce86b3e74ee2870169a31702_cryptolocker.exe 28 PID 2804 wrote to memory of 2204 2804 2024-04-30_f59860bcce86b3e74ee2870169a31702_cryptolocker.exe 28 PID 2804 wrote to memory of 2204 2804 2024-04-30_f59860bcce86b3e74ee2870169a31702_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-30_f59860bcce86b3e74ee2870169a31702_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-30_f59860bcce86b3e74ee2870169a31702_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2204
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
127KB
MD5ff0d07be260f7a189f9cc639d4da5c3b
SHA1d6c6ad0ee382415865be7ce5d214d0f9d2256613
SHA256a102fbe4bb8801513992ef1bcff6cbb4f3ffe31948e7afeb64aa4ee345f1c34a
SHA512c604051f8b01a88f0f020c24ec07c581371e6acf8ad0e149b2386bbea59ca8a7221558f43c8078b22ac6eb98ff9a3cfebb0bcd09bbc4fca97103ce30d08a6f23