Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 16:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-16_02c36a9f4a91fb86c0793473c2ddd5d5_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-16_02c36a9f4a91fb86c0793473c2ddd5d5_cryptolocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-16_02c36a9f4a91fb86c0793473c2ddd5d5_cryptolocker.exe
-
Size
57KB
-
MD5
02c36a9f4a91fb86c0793473c2ddd5d5
-
SHA1
50fb76d2f3bfb7fa540c7a848a918d57b4ca9f48
-
SHA256
e5df5083ee20ea5e5758bd8c99de5fc6b16de3807f5ffa1c152e5bb6bae04ffd
-
SHA512
afe6b6bbbcba29598c898ab45369ce47acdcf24b9cef5f73fbe6e559dc067b47d22cee4c7ae5e36ffd49762504a455fa27a3b026e8d0ebb4073bb1a463bde42f
-
SSDEEP
768:vQz7yVEhs9+js1SQtOOtEvwDpjz9+4hdCW1nw71TkhsiPn1YFv6dl4GC:vj+jsMQMOtEvwDpj5HH1nw73KOFiY
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000b00000001227d-13.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000b00000001227d-13.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 1884 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2972 2024-05-16_02c36a9f4a91fb86c0793473c2ddd5d5_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2972 wrote to memory of 1884 2972 2024-05-16_02c36a9f4a91fb86c0793473c2ddd5d5_cryptolocker.exe 28 PID 2972 wrote to memory of 1884 2972 2024-05-16_02c36a9f4a91fb86c0793473c2ddd5d5_cryptolocker.exe 28 PID 2972 wrote to memory of 1884 2972 2024-05-16_02c36a9f4a91fb86c0793473c2ddd5d5_cryptolocker.exe 28 PID 2972 wrote to memory of 1884 2972 2024-05-16_02c36a9f4a91fb86c0793473c2ddd5d5_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-16_02c36a9f4a91fb86c0793473c2ddd5d5_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-16_02c36a9f4a91fb86c0793473c2ddd5d5_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:1884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD534b186eded9c3cdd155238cb6c551e39
SHA15a7964c8758e63e281bf955cbda3656096e7c1cd
SHA256f88342a1e40cad5f21d9fa3ebdee51a2c2b5c5ee2a0de16e0f93aa5891adcaea
SHA5125f14badc52257bfe86d5e3d32a6a686df7f90276b4f5d8bb7e0f81ae36877bcc32aefbb637bedf8be8c81ca3d1932179324b2f271466c883a7115e705f953a44