Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:56
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-23_d79ddb5166c86a0319bd037897600d36_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-23_d79ddb5166c86a0319bd037897600d36_cryptolocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-23_d79ddb5166c86a0319bd037897600d36_cryptolocker.exe
-
Size
48KB
-
MD5
d79ddb5166c86a0319bd037897600d36
-
SHA1
778e03cac7641f4a32b380e6de10bc0d37bf59f8
-
SHA256
10c81f973b007de345f418e4c3450a1ad79cbbe7346614aafb66e5120dc44888
-
SHA512
7b77119332bbf8d028c4b2c9f3527979793ec68aad5ba238105df94b9c543f01184ffde04d68354b0dfc84053898d7171cb6b432f5141f4c93d6ccd8b6e36871
-
SSDEEP
768:vQz7yVEhs9+js1SQtOOtEvwDpjz9+4/Uth8igNrr42A7n0FmB0nY:vj+jsMQMOtEvwDpj5HczerLO04Br
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\misid.exe CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\misid.exe CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
Processes:
misid.exepid process 2392 misid.exe -
Loads dropped DLL 1 IoCs
Processes:
2024-05-23_d79ddb5166c86a0319bd037897600d36_cryptolocker.exepid process 308 2024-05-23_d79ddb5166c86a0319bd037897600d36_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
2024-05-23_d79ddb5166c86a0319bd037897600d36_cryptolocker.exedescription pid process target process PID 308 wrote to memory of 2392 308 2024-05-23_d79ddb5166c86a0319bd037897600d36_cryptolocker.exe misid.exe PID 308 wrote to memory of 2392 308 2024-05-23_d79ddb5166c86a0319bd037897600d36_cryptolocker.exe misid.exe PID 308 wrote to memory of 2392 308 2024-05-23_d79ddb5166c86a0319bd037897600d36_cryptolocker.exe misid.exe PID 308 wrote to memory of 2392 308 2024-05-23_d79ddb5166c86a0319bd037897600d36_cryptolocker.exe misid.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_d79ddb5166c86a0319bd037897600d36_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-23_d79ddb5166c86a0319bd037897600d36_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5860ef854eb6e5497c16b7b7112e845a2
SHA15d9d85f22745443c266f85735bc0727f0f2c7c72
SHA25666b99e83f43c69c9ac7592ef756e49e2eb2a7d54dfaf647c6d749de4638c738c
SHA51295707761bea1452c5f148d916118380cb98dfe10c74faba79658615e4ab616d9a153b2b39dcc72edb411fc165b40ae7480e42db292b6ce9347e9603aaa130cc1