Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
12-05-2024 04:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-12_896da32028899a4230c40c5c9659bf37_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-05-12_896da32028899a4230c40c5c9659bf37_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-12_896da32028899a4230c40c5c9659bf37_cryptolocker.exe
-
Size
85KB
-
MD5
896da32028899a4230c40c5c9659bf37
-
SHA1
432a0f36b2f68ce48ca13141c5053345b7c67e42
-
SHA256
ad1cdbd0745ce01ecad7296064126d39637628d0588b584ef2d8d35c1775bd25
-
SHA512
52589a6fb75416c6eecbc4e38bcc0700fc704fc0f74c4ce258af8fae21303974e6658819422099995234b374f8964e4b8d28a5f349b4214ba06ad99886743e2c
-
SSDEEP
1536:vj+jsMQMOtEvwDpj5HwYYTjipvF2hBfWafHNBHRx:vCjsIOtEvwDpj5H9YvQd2v
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000d00000001342e-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000d00000001342e-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 3044 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2240 2024-05-12_896da32028899a4230c40c5c9659bf37_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 3044 2240 2024-05-12_896da32028899a4230c40c5c9659bf37_cryptolocker.exe 28 PID 2240 wrote to memory of 3044 2240 2024-05-12_896da32028899a4230c40c5c9659bf37_cryptolocker.exe 28 PID 2240 wrote to memory of 3044 2240 2024-05-12_896da32028899a4230c40c5c9659bf37_cryptolocker.exe 28 PID 2240 wrote to memory of 3044 2240 2024-05-12_896da32028899a4230c40c5c9659bf37_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-12_896da32028899a4230c40c5c9659bf37_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-12_896da32028899a4230c40c5c9659bf37_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85KB
MD57a004643e2c34a2b9d981911db0908c3
SHA1446aa5874c37e35d73d0b48daf31676b8100be09
SHA2560452a32378b2094d6c5636c229bc8ecaabb9f8ac8a149abf4ef03ea153ca8cf3
SHA5125fca017511d6e0d37b34c545703461047b6e30549669c15b8cad1c8e43f17ee4417a35d8adc7566d58d2f0af835d9948f9e1e8172a3409b4021d45b8acc316c9