Analysis
-
max time kernel
126s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
09/06/2024, 02:53
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-09_87f3875bd4ae2b90a6888c77db298e58_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-06-09_87f3875bd4ae2b90a6888c77db298e58_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-09_87f3875bd4ae2b90a6888c77db298e58_cryptolocker.exe
-
Size
70KB
-
MD5
87f3875bd4ae2b90a6888c77db298e58
-
SHA1
bad8ac7e10a2d29c9f55e87757935d3dd1b5ad0f
-
SHA256
4fa5d9238e7a94dc17ecf6bf78123a6a8716c2e6e2568820e18004157e1640e8
-
SHA512
53d261d53b0953f4d65516753b3511095826ee28c386891f042e9d4a06ee18b9d25c3def01c359e83fd62de54f40567e47074b6c6ba91e0c24d9d6c829da9f3a
-
SSDEEP
768:vQz7yVEhs9+js1SQtOOtEvwDpjz9+4ZPsED3VK2+ZtyOjgO4r9vFAg2rq2g1B/R+:vj+jsMQMOtEvwDpj5HZYTjipvF24UD
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000b0000000144e0-21.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000b0000000144e0-21.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2936 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2592 2024-06-09_87f3875bd4ae2b90a6888c77db298e58_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2592 wrote to memory of 2936 2592 2024-06-09_87f3875bd4ae2b90a6888c77db298e58_cryptolocker.exe 28 PID 2592 wrote to memory of 2936 2592 2024-06-09_87f3875bd4ae2b90a6888c77db298e58_cryptolocker.exe 28 PID 2592 wrote to memory of 2936 2592 2024-06-09_87f3875bd4ae2b90a6888c77db298e58_cryptolocker.exe 28 PID 2592 wrote to memory of 2936 2592 2024-06-09_87f3875bd4ae2b90a6888c77db298e58_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_87f3875bd4ae2b90a6888c77db298e58_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-09_87f3875bd4ae2b90a6888c77db298e58_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD5a420403baeac94e5702440f9ef4cfaec
SHA1a24a45afe5b79c3796e27f2e34aae5e71ae26d1b
SHA256a6d75fb368c05a7aded88c307544b950daa34a20a55678d31f4343845a69c421
SHA512c68d648bef7d9b23b8de6548dd77283349738b9387ca8d1df17b707eafc9f7ccc665266781e6929600bd069de63ec5927fa35764e91de87feb2cbc6750ea0b6e