Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01-05-2024 04:09
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-01_45d64ae408005e20be07cbb22728d6fd_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-01_45d64ae408005e20be07cbb22728d6fd_cryptolocker.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-05-01_45d64ae408005e20be07cbb22728d6fd_cryptolocker.exe
-
Size
61KB
-
MD5
45d64ae408005e20be07cbb22728d6fd
-
SHA1
e6bdc056992e5523920dfc2d8b7b7e3b49064245
-
SHA256
dfe4a00f4d0620b3a646e7fb78c8ff72e80e6c00db33a5c6a4279d45a3b74c3c
-
SHA512
cab4adbb79092568e0575a94adeec823a46e486f33e2506c82177b080db07242bb80eeb25f09b2abcd4300f7398575485124978010bb4f6d228b97d3a0d3921a
-
SSDEEP
768:3Uz7yVEhs9+Hs1SQtOOtEvwDpjO9+4hdCY8EQMjpi/Wpi3B3URiLqCyLuAx8XG9R:3P+HsMQMOtEvwDpjoHy7B3g9CWuAxWw
Malware Config
Signatures
-
Detection of CryptoLocker Variants 6 IoCs
resource yara_rule behavioral1/memory/1808-0-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000b000000014712-11.dat CryptoLocker_rule2 behavioral1/memory/1808-13-0x0000000002BC0000-0x0000000002BCB000-memory.dmp CryptoLocker_rule2 behavioral1/memory/1808-16-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2840-18-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2840-27-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 6 IoCs
resource yara_rule behavioral1/memory/1808-0-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_set1 behavioral1/files/0x000b000000014712-11.dat CryptoLocker_set1 behavioral1/memory/1808-13-0x0000000002BC0000-0x0000000002BCB000-memory.dmp CryptoLocker_set1 behavioral1/memory/1808-16-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_set1 behavioral1/memory/2840-18-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_set1 behavioral1/memory/2840-27-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2840 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1808 2024-05-01_45d64ae408005e20be07cbb22728d6fd_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1808 wrote to memory of 2840 1808 2024-05-01_45d64ae408005e20be07cbb22728d6fd_cryptolocker.exe 28 PID 1808 wrote to memory of 2840 1808 2024-05-01_45d64ae408005e20be07cbb22728d6fd_cryptolocker.exe 28 PID 1808 wrote to memory of 2840 1808 2024-05-01_45d64ae408005e20be07cbb22728d6fd_cryptolocker.exe 28 PID 1808 wrote to memory of 2840 1808 2024-05-01_45d64ae408005e20be07cbb22728d6fd_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-01_45d64ae408005e20be07cbb22728d6fd_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-01_45d64ae408005e20be07cbb22728d6fd_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD57469d64f4a9f6391276825c64ccb141a
SHA10ead49b0c30939f35c793f9068b0be8875211b53
SHA256453eb3cc48faf4fd8445f44515f0209043267d0e34b78cb9934d79b15b2a3d63
SHA512e87fc84cccd1b1e4024410d7dd8189ce21752a40ce95334a43d30fc15bac67edb8bbaafb7d7921d04314c9e31524ea08a7de8a6ea86a1751f0bbd71da4bf550c