Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 03:49
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-07_cc2393710cb5bc3bc8307b2dd7a4ade7_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-07_cc2393710cb5bc3bc8307b2dd7a4ade7_cryptolocker.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-05-07_cc2393710cb5bc3bc8307b2dd7a4ade7_cryptolocker.exe
-
Size
66KB
-
MD5
cc2393710cb5bc3bc8307b2dd7a4ade7
-
SHA1
7de5170f04af5e486870966d2dad7e6da4b1d6c4
-
SHA256
831e48000e3a9b98df0151ad9293e98c8b7dcb512f816b8e77ff7cb91911d9bf
-
SHA512
dbc0e6673115fbbdcf2de9b573caf55103303c526a6edade342ac56dc3a7df90cd89401c9e0c45994c8a947980b47236c3b6091869735f6941d12f416016252d
-
SSDEEP
1536:Tj+jsMQMOtEvwDpj5HmpJpOUHECgNMo0vp2l9tMPvdfGyV:TCjsIOtEvwDpj5HE/OUHnSMYa
Malware Config
Signatures
-
Detection of CryptoLocker Variants 3 IoCs
resource yara_rule behavioral1/memory/2508-24-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000d0000000144e9-22.dat CryptoLocker_rule2 behavioral1/memory/2452-8-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 3 IoCs
resource yara_rule behavioral1/memory/2508-24-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_set1 behavioral1/files/0x000d0000000144e9-22.dat CryptoLocker_set1 behavioral1/memory/2452-8-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2508 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2452 2024-05-07_cc2393710cb5bc3bc8307b2dd7a4ade7_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2452 wrote to memory of 2508 2452 2024-05-07_cc2393710cb5bc3bc8307b2dd7a4ade7_cryptolocker.exe 28 PID 2452 wrote to memory of 2508 2452 2024-05-07_cc2393710cb5bc3bc8307b2dd7a4ade7_cryptolocker.exe 28 PID 2452 wrote to memory of 2508 2452 2024-05-07_cc2393710cb5bc3bc8307b2dd7a4ade7_cryptolocker.exe 28 PID 2452 wrote to memory of 2508 2452 2024-05-07_cc2393710cb5bc3bc8307b2dd7a4ade7_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-07_cc2393710cb5bc3bc8307b2dd7a4ade7_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-07_cc2393710cb5bc3bc8307b2dd7a4ade7_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5fb716af5677e84b7f701549d119da10d
SHA1a0570642ef018d047794d5ea3c9fe4bdadc03266
SHA25699cda0cbf9f9a2044ac7f5fde931e1b1164aa34db09339095b6d31894cbf3ac5
SHA512d96c3051f064e5a14ad1655e29813daf7c8247f863f28331dc70cda3ceaf7d4f66c1aeb2b793998b2bd9ae9b57f8b0c31c40c72d6a9a1c7c51e49a5f41ec0363