Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 15:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-20_2f460fba602d89aaa7c6a806c05298d6_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-20_2f460fba602d89aaa7c6a806c05298d6_cryptolocker.exe
Resource
win10v2004-20240611-en
General
-
Target
2024-06-20_2f460fba602d89aaa7c6a806c05298d6_cryptolocker.exe
-
Size
51KB
-
MD5
2f460fba602d89aaa7c6a806c05298d6
-
SHA1
7729a654b3f88ced2d9ee71a6cb07b832ed8f614
-
SHA256
3f7e0e7537bf945a71b0d61f045d253eaa42817ad9754f84c429b2cd7f2ea505
-
SHA512
457b5e5678ebe47e30eeafdbe3fcbe3af8e9ee71e06793e12c91a64f298c6e9470274d89b3ba67b611c11da22eda53388b9131883f6b45241e07bed80639698c
-
SSDEEP
768:OQz7yVEhs9+4OR7tOOtEvwDpjLHqPhqlcnvgpnY1n9V:Oj+1NMOtEvwDpjr8hgpY19V
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral1/memory/1712-0-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000b0000000122ec-11.dat CryptoLocker_rule2 behavioral1/memory/2296-16-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral1/memory/1712-15-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2296-26-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 5 IoCs
resource yara_rule behavioral1/memory/1712-0-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral1/files/0x000b0000000122ec-11.dat CryptoLocker_set1 behavioral1/memory/2296-16-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral1/memory/1712-15-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral1/memory/2296-26-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 -
Detects executables built or packed with MPress PE compressor 5 IoCs
resource yara_rule behavioral1/memory/1712-0-0x0000000000500000-0x000000000050F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/files/0x000b0000000122ec-11.dat INDICATOR_EXE_Packed_MPress behavioral1/memory/2296-16-0x0000000000500000-0x000000000050F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/1712-15-0x0000000000500000-0x000000000050F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2296-26-0x0000000000500000-0x000000000050F000-memory.dmp INDICATOR_EXE_Packed_MPress -
Executes dropped EXE 1 IoCs
pid Process 2296 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1712 2024-06-20_2f460fba602d89aaa7c6a806c05298d6_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2296 1712 2024-06-20_2f460fba602d89aaa7c6a806c05298d6_cryptolocker.exe 28 PID 1712 wrote to memory of 2296 1712 2024-06-20_2f460fba602d89aaa7c6a806c05298d6_cryptolocker.exe 28 PID 1712 wrote to memory of 2296 1712 2024-06-20_2f460fba602d89aaa7c6a806c05298d6_cryptolocker.exe 28 PID 1712 wrote to memory of 2296 1712 2024-06-20_2f460fba602d89aaa7c6a806c05298d6_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-20_2f460fba602d89aaa7c6a806c05298d6_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-20_2f460fba602d89aaa7c6a806c05298d6_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD5b448385b03a5efca6fc9f4b4833ab8b8
SHA1278759e2e3cb38dd5660627c0ebc81b01e074330
SHA2564490775598e93a6c0c8e4a9153d32fe5d9e00c71f84078adc519a01d9e0890a8
SHA51284494d4b021166454ad416d9f684aaf457e15aff5e31456a2213c31086cd8ab1a9f8034261eb0308993a06bf2db47a4461ca54c9b71ae43c468785c1df9faa31