Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-23_364296a05beaaf312154f867cd017d5e_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-05-23_364296a05beaaf312154f867cd017d5e_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-23_364296a05beaaf312154f867cd017d5e_cryptolocker.exe
-
Size
96KB
-
MD5
364296a05beaaf312154f867cd017d5e
-
SHA1
e7916c4c8c9cf2913b6d106203932d6ff586be0a
-
SHA256
7c0439b3feffecde6a31651248bd11584614189d18dc4f20942d04ca68ee8a4a
-
SHA512
dc66f425471212c67350b91d1b192a99c27109f1238bf20bd7f218f151d15fff46124aa4e8a36568dac7dc031b04abe5ecbc979e378019a4f28ce8e96313d3e2
-
SSDEEP
768:xQz7yVEhs9+4uR1bytOOtEvwDpjWfbZ7uyA36S7MpxRXrZSUfFKazNclMjNUvAcP:xj+VGMOtEvwDpjubwQEI8UtzNcO8AcP
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2204-0-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 \Users\Admin\AppData\Local\Temp\misid.exe CryptoLocker_rule2 behavioral1/memory/2204-13-0x00000000005F0000-0x0000000000600000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2204-16-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2540-26-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2204-0-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 \Users\Admin\AppData\Local\Temp\misid.exe CryptoLocker_set1 behavioral1/memory/2204-13-0x00000000005F0000-0x0000000000600000-memory.dmp CryptoLocker_set1 behavioral1/memory/2204-16-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 behavioral1/memory/2540-26-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 -
Detects executables built or packed with MPress PE compressor 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2204-0-0x0000000000500000-0x0000000000510000-memory.dmp INDICATOR_EXE_Packed_MPress \Users\Admin\AppData\Local\Temp\misid.exe INDICATOR_EXE_Packed_MPress behavioral1/memory/2204-13-0x00000000005F0000-0x0000000000600000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2204-16-0x0000000000500000-0x0000000000510000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2540-26-0x0000000000500000-0x0000000000510000-memory.dmp INDICATOR_EXE_Packed_MPress -
Executes dropped EXE 1 IoCs
Processes:
misid.exepid process 2540 misid.exe -
Loads dropped DLL 1 IoCs
Processes:
2024-05-23_364296a05beaaf312154f867cd017d5e_cryptolocker.exepid process 2204 2024-05-23_364296a05beaaf312154f867cd017d5e_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
2024-05-23_364296a05beaaf312154f867cd017d5e_cryptolocker.exedescription pid process target process PID 2204 wrote to memory of 2540 2204 2024-05-23_364296a05beaaf312154f867cd017d5e_cryptolocker.exe misid.exe PID 2204 wrote to memory of 2540 2204 2024-05-23_364296a05beaaf312154f867cd017d5e_cryptolocker.exe misid.exe PID 2204 wrote to memory of 2540 2204 2024-05-23_364296a05beaaf312154f867cd017d5e_cryptolocker.exe misid.exe PID 2204 wrote to memory of 2540 2204 2024-05-23_364296a05beaaf312154f867cd017d5e_cryptolocker.exe misid.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_364296a05beaaf312154f867cd017d5e_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-23_364296a05beaaf312154f867cd017d5e_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5c9d7a031737b075ce0a6f5c14c9de2f3
SHA18ca2776010706f8edd86a17fb470244b16fff900
SHA25627992150998f32e8e75c001f41b606065622972db6574b7cc0212858bb73aba8
SHA512a4a007fe45f12dfd2425ab79a9ecebee4842932de06d8dea8cca591996447ee5b786d4640fe6ce248c2340870c171b317019903b5fca12b5d9d0818207c352d0