Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:24
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-23_36ffa1e0937cd72e19d7e578ac8e36cb_cryptolocker.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-05-23_36ffa1e0937cd72e19d7e578ac8e36cb_cryptolocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-23_36ffa1e0937cd72e19d7e578ac8e36cb_cryptolocker.exe
-
Size
86KB
-
MD5
36ffa1e0937cd72e19d7e578ac8e36cb
-
SHA1
8c6e7d7e77da0d0eec2fc4fb4f456db2014e3ca2
-
SHA256
4908fe13451c912edd684fa53b12df0ceb0e36225c9fc760de80a5557cdb88e9
-
SHA512
53c27aed63d01985ae0af016efd7f3991e51933c183d8304c2aa7f01bcf407d8d228626f15e1252690b06b5698713447c7573c60e81e2d346f816b937904d032
-
SSDEEP
1536:vj+jsMQMOtEvwDpj5HwYYTjipvF2hBfWafHNBlA:vCjsIOtEvwDpj5H9YvQd2O
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000b00000001226e-13.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000b00000001226e-13.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2340 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1620 2024-05-23_36ffa1e0937cd72e19d7e578ac8e36cb_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1620 wrote to memory of 2340 1620 2024-05-23_36ffa1e0937cd72e19d7e578ac8e36cb_cryptolocker.exe 28 PID 1620 wrote to memory of 2340 1620 2024-05-23_36ffa1e0937cd72e19d7e578ac8e36cb_cryptolocker.exe 28 PID 1620 wrote to memory of 2340 1620 2024-05-23_36ffa1e0937cd72e19d7e578ac8e36cb_cryptolocker.exe 28 PID 1620 wrote to memory of 2340 1620 2024-05-23_36ffa1e0937cd72e19d7e578ac8e36cb_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_36ffa1e0937cd72e19d7e578ac8e36cb_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-23_36ffa1e0937cd72e19d7e578ac8e36cb_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87KB
MD564b1e3776a4abb81b1db143a3dfdfc4e
SHA10cb7b962980380bdfdebe512d8474c40d3825f63
SHA256763de81c047f4bc0e1705451d00d72dc9d304e17ea586cb2bd48a6e4c14c0fc1
SHA5122efe83cb1227076401a4422240b8250366902836d8ffc322545f005a874b3918f6f2e077ddf8e0aad11546470d1becb95036ca89ddac04dbe13a5741db6fb829