Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:35
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-22_5e95cee1d1c60403802260565f01e5e1_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-22_5e95cee1d1c60403802260565f01e5e1_cryptolocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-22_5e95cee1d1c60403802260565f01e5e1_cryptolocker.exe
-
Size
70KB
-
MD5
5e95cee1d1c60403802260565f01e5e1
-
SHA1
09b98d9781e22d8d167d95cd537ffdf73fb982a2
-
SHA256
117e1ff2ebff6665bf5012bcbabb0e3a92d705b9f163146b01314623887ff3b3
-
SHA512
8dc6181d5cd818f292d0a70a44f361e3341da6873f07f9dc287bf08443a9ed780969d3f25020848d891ac302bbc933aa15baa248777be497615b4fe0a572a035
-
SSDEEP
768:vQz7yVEhs9+js1SQtOOtEvwDpjz9+4ZPsED3VK2+ZtyOjgO4r9vFAg2rq2g1B/R+:vj+jsMQMOtEvwDpj5HZYTjipvF24G
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\misid.exe CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\misid.exe CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
Processes:
misid.exepid process 3024 misid.exe -
Loads dropped DLL 1 IoCs
Processes:
2024-05-22_5e95cee1d1c60403802260565f01e5e1_cryptolocker.exepid process 2000 2024-05-22_5e95cee1d1c60403802260565f01e5e1_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
2024-05-22_5e95cee1d1c60403802260565f01e5e1_cryptolocker.exedescription pid process target process PID 2000 wrote to memory of 3024 2000 2024-05-22_5e95cee1d1c60403802260565f01e5e1_cryptolocker.exe misid.exe PID 2000 wrote to memory of 3024 2000 2024-05-22_5e95cee1d1c60403802260565f01e5e1_cryptolocker.exe misid.exe PID 2000 wrote to memory of 3024 2000 2024-05-22_5e95cee1d1c60403802260565f01e5e1_cryptolocker.exe misid.exe PID 2000 wrote to memory of 3024 2000 2024-05-22_5e95cee1d1c60403802260565f01e5e1_cryptolocker.exe misid.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_5e95cee1d1c60403802260565f01e5e1_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-22_5e95cee1d1c60403802260565f01e5e1_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:3024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD5c5379cbabe0e0859502fef6f5779c29d
SHA12ac58ba22f962c652508242fbf52b1f1ce4fe2a5
SHA256638fbd8cc99ccf6d1633bc6c792eeba290bc542afacb203e56aa2308a740c647
SHA512e343db5af33dd8b7d0e124ca6f93f0e652aa6fcbc54b2817374439f662af0f2d2342a239ce35fbd90a2e72e705f7ab359ad1de02f0890abf8a0395e67b9d60b6