Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
12-05-2024 06:39
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-12_b9bbff0d1abd465ce4c0960c41ded006_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-05-12_b9bbff0d1abd465ce4c0960c41ded006_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-12_b9bbff0d1abd465ce4c0960c41ded006_cryptolocker.exe
-
Size
86KB
-
MD5
b9bbff0d1abd465ce4c0960c41ded006
-
SHA1
28e5b232d943d004876da8d3c8edd0a057849fe2
-
SHA256
ce942d26ac7d21db88a7cf04518eedbca0cfcece48f134978bff389c883989ba
-
SHA512
b1c572179d6ab62f359fa59d3ea09bf513d68b2850a5224cbb450c02d4b03418d93d2f4109a74c395174a46a3abb5d03cbe909e398cccfbce1fc60dec1aaf42a
-
SSDEEP
1536:vj+jsMQMOtEvwDpj5HwYYTjipvF2hBfWafHNBgU:vCjsIOtEvwDpj5H9YvQd25
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000c00000001220d-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000c00000001220d-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 3020 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2988 2024-05-12_b9bbff0d1abd465ce4c0960c41ded006_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2988 wrote to memory of 3020 2988 2024-05-12_b9bbff0d1abd465ce4c0960c41ded006_cryptolocker.exe 28 PID 2988 wrote to memory of 3020 2988 2024-05-12_b9bbff0d1abd465ce4c0960c41ded006_cryptolocker.exe 28 PID 2988 wrote to memory of 3020 2988 2024-05-12_b9bbff0d1abd465ce4c0960c41ded006_cryptolocker.exe 28 PID 2988 wrote to memory of 3020 2988 2024-05-12_b9bbff0d1abd465ce4c0960c41ded006_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-12_b9bbff0d1abd465ce4c0960c41ded006_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-12_b9bbff0d1abd465ce4c0960c41ded006_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD57c5a4d56eae7887d3ce82c17a6cbc068
SHA138dde5f8c074394b9c4bc3db474ecb2658830b80
SHA256f5b9b0ec939e8b133e0d00cb1a37dc7c384e0ba28503fc00b959e8d04ecb2ad7
SHA512425bb086d8c8e98c1a3586b0551f0e70c3b50707580e18a078bcc0c91bfafd400c763f208851e7721a4636e28a78c02c90ba8b8583e78d033a76729c070d1da1