Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 20:47
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-01_9ebe7970881a7c2ffae4dfad5d2f1f2c_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-01_9ebe7970881a7c2ffae4dfad5d2f1f2c_cryptolocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-06-01_9ebe7970881a7c2ffae4dfad5d2f1f2c_cryptolocker.exe
-
Size
49KB
-
MD5
9ebe7970881a7c2ffae4dfad5d2f1f2c
-
SHA1
d44f3aa0d0e535111c5c2fbcfa8314386f0eee31
-
SHA256
88cd234efaba4ff8a820e143658b9f1421a9c5d541c5de40d6ebc4ce8d0f7b0c
-
SHA512
575ff88f22bb55eafb1c76a47c437c4f116e9be1d2cf53606fe3be66ab6670609e2ab2bce1108c8b021754392fa7dcdb9f197aea899b4cc49229ce1dc76b3ab4
-
SSDEEP
768:vQz7yVEhs9+js1SQtOOtEvwDpjz9+4/Uth8igNrr42A7n0FmB0n3:vj+jsMQMOtEvwDpj5HczerLO04BE
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000c0000000132c6-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000c0000000132c6-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2552 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2692 2024-06-01_9ebe7970881a7c2ffae4dfad5d2f1f2c_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2552 2692 2024-06-01_9ebe7970881a7c2ffae4dfad5d2f1f2c_cryptolocker.exe 28 PID 2692 wrote to memory of 2552 2692 2024-06-01_9ebe7970881a7c2ffae4dfad5d2f1f2c_cryptolocker.exe 28 PID 2692 wrote to memory of 2552 2692 2024-06-01_9ebe7970881a7c2ffae4dfad5d2f1f2c_cryptolocker.exe 28 PID 2692 wrote to memory of 2552 2692 2024-06-01_9ebe7970881a7c2ffae4dfad5d2f1f2c_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-01_9ebe7970881a7c2ffae4dfad5d2f1f2c_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-01_9ebe7970881a7c2ffae4dfad5d2f1f2c_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD50223a6c750a3416786180e77c60973df
SHA1ea499bf08ae933dd7eb98aa443896859e4c14729
SHA256b2d38f90cea7b7e7bc71d54ad2b9a394490b981d2e306ad4b5566784abe0f676
SHA5125f2040aec08433e4fe9caa3574150a67d61bb768a2ddd6edab477c02a58e1e336453128ec09791ddeb2900097bc922bcd56f423835817e13b9a51b98a5f8c572