Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 04:45
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-28_27876b7ab5daf05be72f0d279095839a_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-28_27876b7ab5daf05be72f0d279095839a_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-28_27876b7ab5daf05be72f0d279095839a_cryptolocker.exe
-
Size
38KB
-
MD5
27876b7ab5daf05be72f0d279095839a
-
SHA1
633a6bb6d124f31440d8e1f1410a45d7d0bb96c2
-
SHA256
3f3e790d15a1d4d8de09b02b313f40692ca64f948a12eb5811f082e9ca88fb0f
-
SHA512
2ecd6682e137d7bd6324aa3bc68cecc5245096aa74ce9753049ee5f038498ab81bd7c811fecb5e5ff07d18bd04cf3c15e6f41e69780b1e45d0e675b55f0b1427
-
SSDEEP
768:fTz7y3lhsT+hs1SQtOOtEvwDpjfAu9+4qad:fT+hsMQMOtEvwDpjoIH/d
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000c0000000141a1-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000c0000000141a1-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 3016 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1644 2024-05-28_27876b7ab5daf05be72f0d279095839a_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1644 wrote to memory of 3016 1644 2024-05-28_27876b7ab5daf05be72f0d279095839a_cryptolocker.exe 28 PID 1644 wrote to memory of 3016 1644 2024-05-28_27876b7ab5daf05be72f0d279095839a_cryptolocker.exe 28 PID 1644 wrote to memory of 3016 1644 2024-05-28_27876b7ab5daf05be72f0d279095839a_cryptolocker.exe 28 PID 1644 wrote to memory of 3016 1644 2024-05-28_27876b7ab5daf05be72f0d279095839a_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_27876b7ab5daf05be72f0d279095839a_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-28_27876b7ab5daf05be72f0d279095839a_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:3016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD5f2e8c806a47c2ac1d544f68cca5b1eda
SHA1e953d1859def22c62a1f987bfc1d4d39bf04775c
SHA256bbb9837417e3ae434cb7b88b8e30bee86962b8910c8909b5b57927fd62caa524
SHA512187e6635fe8f824d50641767a0d0efb20ada2d38a4b16cc6716a502b5fbca64216366f2327d43a856c56680da5ea144390cb49dc231ebe2e86d42673a43e0253