Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 14:29
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-02_2624dec502be233d40d064b8d9ca1211_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-02_2624dec502be233d40d064b8d9ca1211_cryptolocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-02_2624dec502be233d40d064b8d9ca1211_cryptolocker.exe
-
Size
40KB
-
MD5
2624dec502be233d40d064b8d9ca1211
-
SHA1
2c328aef8b2b205983fca93da3f4caa03929ceae
-
SHA256
b9c738ddf3acfdfae6d270c112ad679d7741846b77021c75ae473fa0d4c65330
-
SHA512
8298c11f71b1d3574f0f20279401b0916d713c3164669b488a64e4cbecbffd1ef7004ba4786b80404f409aa865bb9868b325d442637dc5024ad24adeba200d7f
-
SSDEEP
768:UEEmoQDj/xnMp+yptndwe/PWQtOOtEvwDpjLeJAsKuD+c:ZzFbxmLPWQMOtEvwDpjLeJAsKcp
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000b00000001430e-11.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2108 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2012 2024-05-02_2624dec502be233d40d064b8d9ca1211_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2012 wrote to memory of 2108 2012 2024-05-02_2624dec502be233d40d064b8d9ca1211_cryptolocker.exe 28 PID 2012 wrote to memory of 2108 2012 2024-05-02_2624dec502be233d40d064b8d9ca1211_cryptolocker.exe 28 PID 2012 wrote to memory of 2108 2012 2024-05-02_2624dec502be233d40d064b8d9ca1211_cryptolocker.exe 28 PID 2012 wrote to memory of 2108 2012 2024-05-02_2624dec502be233d40d064b8d9ca1211_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-02_2624dec502be233d40d064b8d9ca1211_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-02_2624dec502be233d40d064b8d9ca1211_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD58811ca24dc525fd25710850a033e75a9
SHA104bb4f0e1f6c5e3ef88ad032414bf4754b34e335
SHA256108d8bb541eb3a6cdedaa7a826d753b612bb2818e315daeb0bc217419617c6d4
SHA51272e4c95fca5855b5dbf0eb909cecc80e2496b1adda6513ac5181a0ae1be0a3dbb62bf036ba46888ddaa361cc86efc46ec2f2eb06a4b0f8456914a7bd2f406f7c