Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 20:51
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-22_e9326c92642038c5aebc42e5df691b52_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-22_e9326c92642038c5aebc42e5df691b52_cryptolocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-22_e9326c92642038c5aebc42e5df691b52_cryptolocker.exe
-
Size
42KB
-
MD5
e9326c92642038c5aebc42e5df691b52
-
SHA1
272b485767daabba3390c32b229d8b071a65e5e1
-
SHA256
93dc187f818330a2f57a355a0c74f18ae0392e4e071972e61d128bfecdff01f2
-
SHA512
85761cdb0004948136e865a6167e288c8d8a71d00d278a8896daaecf68a58d26d11c332cc0c077f3afc2b0a83ebb1987c6ccc054da1903f4ba12be76fdcbebc8
-
SSDEEP
768:XS5nQJ24LR1bytOOtEvwDpj66BLbjG9Rva/yYshNhL:i5nkFGMOtEvwDpjR+viHshNd
Malware Config
Signatures
-
Detection of CryptoLocker Variants 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2000-8-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 \Users\Admin\AppData\Local\Temp\misid.exe CryptoLocker_rule2 behavioral1/memory/3016-16-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral1/memory/3016-25-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2000-8-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral1/memory/3016-25-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 -
Detects executables built or packed with MPress PE compressor 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2000-8-0x0000000000500000-0x000000000050F000-memory.dmp INDICATOR_EXE_Packed_MPress \Users\Admin\AppData\Local\Temp\misid.exe INDICATOR_EXE_Packed_MPress behavioral1/memory/3016-16-0x0000000000500000-0x000000000050F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/3016-25-0x0000000000500000-0x000000000050F000-memory.dmp INDICATOR_EXE_Packed_MPress -
Executes dropped EXE 1 IoCs
Processes:
misid.exepid process 3016 misid.exe -
Loads dropped DLL 1 IoCs
Processes:
2024-05-22_e9326c92642038c5aebc42e5df691b52_cryptolocker.exepid process 2000 2024-05-22_e9326c92642038c5aebc42e5df691b52_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
2024-05-22_e9326c92642038c5aebc42e5df691b52_cryptolocker.exedescription pid process target process PID 2000 wrote to memory of 3016 2000 2024-05-22_e9326c92642038c5aebc42e5df691b52_cryptolocker.exe misid.exe PID 2000 wrote to memory of 3016 2000 2024-05-22_e9326c92642038c5aebc42e5df691b52_cryptolocker.exe misid.exe PID 2000 wrote to memory of 3016 2000 2024-05-22_e9326c92642038c5aebc42e5df691b52_cryptolocker.exe misid.exe PID 2000 wrote to memory of 3016 2000 2024-05-22_e9326c92642038c5aebc42e5df691b52_cryptolocker.exe misid.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_e9326c92642038c5aebc42e5df691b52_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-22_e9326c92642038c5aebc42e5df691b52_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:3016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD59300a640b5fe1ca83db4b2275d8f580d
SHA16fd3fb54fe9d212d73b7fdacd2f7ef7129f32fec
SHA2560585068ca1fd8e2b347cc0a8cfd6b71d54d3c1eedc3f5ae7b87a8b404005d651
SHA5122305b0382bfc0a85e1d62058298f3fa1da221587613749ae4642d12875d429af51b6e29ffe24c3de8737f4bcb0c26d03de833d97b51948e5654b75cd19d03d14