Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 05:24
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-24_10016e321ebdac187e52c7491639087e_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-24_10016e321ebdac187e52c7491639087e_cryptolocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-24_10016e321ebdac187e52c7491639087e_cryptolocker.exe
-
Size
66KB
-
MD5
10016e321ebdac187e52c7491639087e
-
SHA1
c2b034afa97d577a5891839897e9403edae180db
-
SHA256
36cbae402419d78b1216ca5ebbc27bf7ed95ce8a9ef50b98e04012e986d7ae0a
-
SHA512
a6cb5e29ab3729895d41b85193669d160d0f0e34557fd4fa26771dc1dae046e306ce8ba86d7bca3a98dfba045a7ce516d7f9956580ba5c9f2cbdbf2e57e38100
-
SSDEEP
1536:Tj+jsMQMOtEvwDpj5HmpJpOUHECgNMo0vp2l9tMPvdfGyz:TCjsIOtEvwDpj5HE/OUHnSMY4
Malware Config
Signatures
-
Detection of CryptoLocker Variants 6 IoCs
resource yara_rule behavioral1/memory/2412-0-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000d0000000122eb-11.dat CryptoLocker_rule2 behavioral1/memory/2412-13-0x0000000000480000-0x000000000048E000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2412-16-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2880-18-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2880-27-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 6 IoCs
resource yara_rule behavioral1/memory/2412-0-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_set1 behavioral1/files/0x000d0000000122eb-11.dat CryptoLocker_set1 behavioral1/memory/2412-13-0x0000000000480000-0x000000000048E000-memory.dmp CryptoLocker_set1 behavioral1/memory/2412-16-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_set1 behavioral1/memory/2880-18-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_set1 behavioral1/memory/2880-27-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2880 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2412 2024-05-24_10016e321ebdac187e52c7491639087e_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2880 2412 2024-05-24_10016e321ebdac187e52c7491639087e_cryptolocker.exe 28 PID 2412 wrote to memory of 2880 2412 2024-05-24_10016e321ebdac187e52c7491639087e_cryptolocker.exe 28 PID 2412 wrote to memory of 2880 2412 2024-05-24_10016e321ebdac187e52c7491639087e_cryptolocker.exe 28 PID 2412 wrote to memory of 2880 2412 2024-05-24_10016e321ebdac187e52c7491639087e_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_10016e321ebdac187e52c7491639087e_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-24_10016e321ebdac187e52c7491639087e_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2880
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5e214ad6c4131713a49beb732546614ac
SHA1a0bd5000e325415bd097ecf41a1a7cfee8d88354
SHA256148b83b6872dc79d2860a20101edf397fde48736840a4ed40d9dfe806b32d9c7
SHA512c30b1ea0cfd112e673ff3086b144cb3a53e5a1b6f0e212ff5339757c34e88740ae748ffc50d0d705ca478038443cc6c54038d06b31d6386722626029745d0f3b