Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
09-05-2024 07:46
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-09_c6c2918f1aab4192b2c5d543520d641e_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-09_c6c2918f1aab4192b2c5d543520d641e_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-09_c6c2918f1aab4192b2c5d543520d641e_cryptolocker.exe
-
Size
86KB
-
MD5
c6c2918f1aab4192b2c5d543520d641e
-
SHA1
1e9b4d333cd5708a64e58cb42ccda5fb29879f66
-
SHA256
4598848b794ec60a8388b3a92e7eed1561a6e0d7bf72b432985d9dd750bfb4d1
-
SHA512
aed4c21064d0e7cb242a665551208798d9c60b26141c5f1bfb7e4b937648b637f066c47868e66d2a9bcbc24c626900c1bf8b2478e42a8f8122af596386c59b5d
-
SSDEEP
1536:vj+jsMQMOtEvwDpj5HwYYTjipvF2hBfWafHNBli:vCjsIOtEvwDpj5H9YvQd2U
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000e00000001226b-13.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000e00000001226b-13.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 1776 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2976 2024-05-09_c6c2918f1aab4192b2c5d543520d641e_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2976 wrote to memory of 1776 2976 2024-05-09_c6c2918f1aab4192b2c5d543520d641e_cryptolocker.exe 28 PID 2976 wrote to memory of 1776 2976 2024-05-09_c6c2918f1aab4192b2c5d543520d641e_cryptolocker.exe 28 PID 2976 wrote to memory of 1776 2976 2024-05-09_c6c2918f1aab4192b2c5d543520d641e_cryptolocker.exe 28 PID 2976 wrote to memory of 1776 2976 2024-05-09_c6c2918f1aab4192b2c5d543520d641e_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-09_c6c2918f1aab4192b2c5d543520d641e_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-09_c6c2918f1aab4192b2c5d543520d641e_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:1776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD51352aedd114de9039f4f7686470d04ab
SHA1777ed2a88ff57ef6fc91d85925c267f2a042c30f
SHA2566572f9540f63455f67b3181109fe0a60465740bc87937227792fdd9bc6a1b233
SHA512bac6a18d1d8aad6509b2064b3c8050e7023da3d2515ed0bd253a4bdd57e2ef82b8ca0c700720961875bc80843e42911c6dc1abed62a2e5c4b29ca6258338d2aa