Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
12/06/2024, 23:34
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-12_9480548663dfa5657755886e4741fe8c_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-12_9480548663dfa5657755886e4741fe8c_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-12_9480548663dfa5657755886e4741fe8c_cryptolocker.exe
-
Size
63KB
-
MD5
9480548663dfa5657755886e4741fe8c
-
SHA1
b388d1422df1ecda9e4e48a0b9469465b8e2c32b
-
SHA256
3cbd5fe5e7166e03e86d30acbc321f183aee26136861c084b39ea46598d9ac63
-
SHA512
273ab30606a7b3d2f5ce40dab063c8b3a5a34f502b771ab93d4db62db498a714d2bb28ac08d208a14d7770f19dcfa45ea3ef0a562d3e50e118c0f59d0494bf95
-
SSDEEP
1536:3P+HsMQMOtEvwDpjoHy7B3g9CWuAxWTAf:3WHsIOtEvwDpjoHYG
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral1/memory/3044-1-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000a000000012286-15.dat CryptoLocker_rule2 behavioral1/memory/3044-14-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2388-16-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2388-26-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 5 IoCs
resource yara_rule behavioral1/memory/3044-1-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_set1 behavioral1/files/0x000a000000012286-15.dat CryptoLocker_set1 behavioral1/memory/3044-14-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_set1 behavioral1/memory/2388-16-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_set1 behavioral1/memory/2388-26-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2388 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 3044 2024-06-12_9480548663dfa5657755886e4741fe8c_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2388 3044 2024-06-12_9480548663dfa5657755886e4741fe8c_cryptolocker.exe 28 PID 3044 wrote to memory of 2388 3044 2024-06-12_9480548663dfa5657755886e4741fe8c_cryptolocker.exe 28 PID 3044 wrote to memory of 2388 3044 2024-06-12_9480548663dfa5657755886e4741fe8c_cryptolocker.exe 28 PID 3044 wrote to memory of 2388 3044 2024-06-12_9480548663dfa5657755886e4741fe8c_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-12_9480548663dfa5657755886e4741fe8c_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-12_9480548663dfa5657755886e4741fe8c_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD528e10a1ce1ea64c8622f0e31f23d29b5
SHA1fa499008c74b85c7f023414cc3e7e823fd452e48
SHA256d018390cbceb09abda793048c0e04b4b85634960a9d4c34bd91738822b6fa801
SHA512ebb52027bd383de604124e7103edce606786becb541b128761fe606b144b9accde601ef74d87526b01bfb2bf6ef56dd878979149ae28c17dd408cf145d9c25f7