Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
09-06-2024 19:42
Static task
static1
Behavioral task
behavioral1
Sample
20240609734990006671224cc5fb8d06037e429acryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
20240609734990006671224cc5fb8d06037e429acryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
20240609734990006671224cc5fb8d06037e429acryptolocker.exe
-
Size
63KB
-
MD5
734990006671224cc5fb8d06037e429a
-
SHA1
98d97b0917465d473d04c277a9951066231420d5
-
SHA256
17d45bb8bbd134d6e5c9ef3594c3ce036d97b1acd72a76d6c039fa2da6a3ca3e
-
SHA512
99305643e54b3888ab6156e62c183115711ce3d1b06dba0fda1be9b43e1f51ef48e3f7670f32003a278ad514a66872afcea31da42a3bf0b6dd8d9d494c7aaf88
-
SSDEEP
768:3Uz7yVEhs9+Hs1SQtOOtEvwDpjO9+4hdCY8EQMjpi/Wpi3B3URiLqCyLuAx8XG9x:3P+HsMQMOtEvwDpjoHy7B3g9CWuAxWo
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2496 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2228 20240609734990006671224cc5fb8d06037e429acryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2496 2228 20240609734990006671224cc5fb8d06037e429acryptolocker.exe 28 PID 2228 wrote to memory of 2496 2228 20240609734990006671224cc5fb8d06037e429acryptolocker.exe 28 PID 2228 wrote to memory of 2496 2228 20240609734990006671224cc5fb8d06037e429acryptolocker.exe 28 PID 2228 wrote to memory of 2496 2228 20240609734990006671224cc5fb8d06037e429acryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\20240609734990006671224cc5fb8d06037e429acryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\20240609734990006671224cc5fb8d06037e429acryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2496
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD5b7e7e7a1010433d64623d1d99d950990
SHA1eddabbcbe17422e355d082f1d0b75ccd9fe199de
SHA256d5fe54eb508e9e865b404f10fb5312a4bf8bb49e2e15380f57112a7e66966073
SHA512bd07fa1bbf86fde9ee190df55e3b09a18bcfa22f6c313029494b94fc68136f031390776b5ec5a3647fa0a4918155082038042a1af4bce1ff4001647c633de4cf