Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 21:17
Static task
static1
Behavioral task
behavioral1
Sample
202405244a2e467599fd3fe7157fe0de27adab20cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
202405244a2e467599fd3fe7157fe0de27adab20cryptolocker.exe
Resource
win10v2004-20240426-en
General
-
Target
202405244a2e467599fd3fe7157fe0de27adab20cryptolocker.exe
-
Size
49KB
-
MD5
4a2e467599fd3fe7157fe0de27adab20
-
SHA1
2513023b83500d91c6cc89e318a1e5a6b853f5ee
-
SHA256
40a968ec095e01624a5a39b6398381863e3786329e29bc0f12ebcb686aa6ba05
-
SHA512
ec0d94f58e2f25a13595e339d82a8c53b18848779f7672762570b8593afd3c383e215abc31527f99ad655bb1bce9e1d0ee57ba60519080fc1249472188e5a49d
-
SSDEEP
768:vQz7yVEhs9+js1SQtOOtEvwDpjz9+4/Uth8igNrr42A7n0FmB0nNX:vj+jsMQMOtEvwDpj5HczerLO04B8X
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2132 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 108 202405244a2e467599fd3fe7157fe0de27adab20cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 108 wrote to memory of 2132 108 202405244a2e467599fd3fe7157fe0de27adab20cryptolocker.exe 28 PID 108 wrote to memory of 2132 108 202405244a2e467599fd3fe7157fe0de27adab20cryptolocker.exe 28 PID 108 wrote to memory of 2132 108 202405244a2e467599fd3fe7157fe0de27adab20cryptolocker.exe 28 PID 108 wrote to memory of 2132 108 202405244a2e467599fd3fe7157fe0de27adab20cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\202405244a2e467599fd3fe7157fe0de27adab20cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\202405244a2e467599fd3fe7157fe0de27adab20cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:108 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD5e92982548d1a5b9fb57b832a9d113990
SHA1dde68d612800b6c2f54015192745b375b725fa8f
SHA256a22f27c74fb474f7d5e7d72b61f289fdc1b0afe856ea2fed0d5c8a7944f2db36
SHA51262402dcccfb41234bba9baddf3b6caaad4157dedd40ad98afe078a08cbaa5dbb1c8778e229a2ccc8b3bdd61d0344050a5a6888128c244d0de6d4b288d39e1bc2