Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 02:24
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-23_1de9fc77cf17d5f48e581e60f85c6ce8_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-23_1de9fc77cf17d5f48e581e60f85c6ce8_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-23_1de9fc77cf17d5f48e581e60f85c6ce8_cryptolocker.exe
-
Size
42KB
-
MD5
1de9fc77cf17d5f48e581e60f85c6ce8
-
SHA1
a705a3ac88f85ced7c6d9dc7a6a765a159a31071
-
SHA256
ced836e39f0584c0b794a83a94e5fd4e9ad391725bd42926e07e1172d1d1bc6b
-
SHA512
b902cc967b4cbcfaf5f21804154fb5a4c2ec6c05db6666f0bf79ec05b6ee9ed35456a04adb186b7193a8d4ebd11abf17460cb35f711397b82a30b4151b349b69
-
SSDEEP
768:XS5nQJ24LR1bytOOtEvwDpj66BLbjG9Rva/yYshNhK:i5nkFGMOtEvwDpjR+viHshN4
Malware Config
Signatures
-
Detection of CryptoLocker Variants 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1836-0-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 \Users\Admin\AppData\Local\Temp\misid.exe CryptoLocker_rule2 behavioral1/memory/1836-12-0x0000000000630000-0x000000000063F000-memory.dmp CryptoLocker_rule2 behavioral1/memory/1836-17-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral1/memory/1884-18-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral1/memory/1884-28-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1836-17-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral1/memory/1884-18-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral1/memory/1884-28-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 -
Detects executables built or packed with MPress PE compressor 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1836-0-0x0000000000500000-0x000000000050F000-memory.dmp INDICATOR_EXE_Packed_MPress \Users\Admin\AppData\Local\Temp\misid.exe INDICATOR_EXE_Packed_MPress behavioral1/memory/1836-12-0x0000000000630000-0x000000000063F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/1836-17-0x0000000000500000-0x000000000050F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/1884-18-0x0000000000500000-0x000000000050F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/1884-28-0x0000000000500000-0x000000000050F000-memory.dmp INDICATOR_EXE_Packed_MPress -
Executes dropped EXE 1 IoCs
Processes:
misid.exepid process 1884 misid.exe -
Loads dropped DLL 1 IoCs
Processes:
2024-05-23_1de9fc77cf17d5f48e581e60f85c6ce8_cryptolocker.exepid process 1836 2024-05-23_1de9fc77cf17d5f48e581e60f85c6ce8_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
2024-05-23_1de9fc77cf17d5f48e581e60f85c6ce8_cryptolocker.exedescription pid process target process PID 1836 wrote to memory of 1884 1836 2024-05-23_1de9fc77cf17d5f48e581e60f85c6ce8_cryptolocker.exe misid.exe PID 1836 wrote to memory of 1884 1836 2024-05-23_1de9fc77cf17d5f48e581e60f85c6ce8_cryptolocker.exe misid.exe PID 1836 wrote to memory of 1884 1836 2024-05-23_1de9fc77cf17d5f48e581e60f85c6ce8_cryptolocker.exe misid.exe PID 1836 wrote to memory of 1884 1836 2024-05-23_1de9fc77cf17d5f48e581e60f85c6ce8_cryptolocker.exe misid.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_1de9fc77cf17d5f48e581e60f85c6ce8_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-23_1de9fc77cf17d5f48e581e60f85c6ce8_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:1884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD585a2c4c375dc506fd5fb3ebf1d5aaa5a
SHA1ca8962a3dd7b9de48382a651c52af84b86055fbf
SHA256881fed86f29ca204e7397611d81f4776d709edd3cc97ba57f424c20990af9f8b
SHA512f023f69c1ed4c1d78e5ff1aca684e526086061dd0e6e9ae6d5eb7ac0096550b78b33606599109a4c8c78df6780a837d74604ba2211e9ce84b7a4fff635bf654f