Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 00:47
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-12_9dc01119c33d625d363f8a52c5d3c969_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-12_9dc01119c33d625d363f8a52c5d3c969_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-12_9dc01119c33d625d363f8a52c5d3c969_cryptolocker.exe
-
Size
38KB
-
MD5
9dc01119c33d625d363f8a52c5d3c969
-
SHA1
ceababadbda334995503b320f1814482c7278342
-
SHA256
682ad2d6791a5c12370a4261ea4c1b6caa0e7ced11374c30ac6e95ce176caf5a
-
SHA512
c9575a54c8e89e2c173ce1dd8c000986b81cd8b2869cc4b0f80a4a068de4aab14611679d04c02256b7ecb47cf68a5e44b11b8450739e270404e4dd3e1b8953d1
-
SSDEEP
768:UEEmoQDj/xnMp+yptndwe/PWQtOOtEvwDpjLenUZ:ZzFbxmLPWQMOtEvwDpjLeI
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000e00000001228a-11.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2372 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2436 2024-05-12_9dc01119c33d625d363f8a52c5d3c969_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2372 2436 2024-05-12_9dc01119c33d625d363f8a52c5d3c969_cryptolocker.exe 28 PID 2436 wrote to memory of 2372 2436 2024-05-12_9dc01119c33d625d363f8a52c5d3c969_cryptolocker.exe 28 PID 2436 wrote to memory of 2372 2436 2024-05-12_9dc01119c33d625d363f8a52c5d3c969_cryptolocker.exe 28 PID 2436 wrote to memory of 2372 2436 2024-05-12_9dc01119c33d625d363f8a52c5d3c969_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-12_9dc01119c33d625d363f8a52c5d3c969_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-12_9dc01119c33d625d363f8a52c5d3c969_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD52ea65dc39f7824bdcdd56c2129978d59
SHA13a14854c62ef8a47b5db5f28f1a6e6d62713c44f
SHA25679981e6227285d6fd8b3122edb1fe95a021e5474dc1fbc1399cc105a5a1aaab6
SHA51288c6cae4105bc31ccaca2df0acf29053f36d311a2e53c15a600113a4806e93e6a87469fe3c03d97fee5b3e6ded42948daed5ec3c141ca7c4c43f8974e07c82f5