Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
08-07-2024 20:25
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-08_22a5ab6d9ad3ec3233e66fcee2e1640f_cryptolocker.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-07-08_22a5ab6d9ad3ec3233e66fcee2e1640f_cryptolocker.exe
Resource
win10v2004-20240704-en
General
-
Target
2024-07-08_22a5ab6d9ad3ec3233e66fcee2e1640f_cryptolocker.exe
-
Size
69KB
-
MD5
22a5ab6d9ad3ec3233e66fcee2e1640f
-
SHA1
9b327bc9ed1639b6b00b4a08ea7ff99b84d89e26
-
SHA256
3b20be38dd9ff0c818e18d87e2998f2188d557b0cd2ef1c7cae939353cb2304e
-
SHA512
294a283e092d081501046ba7302e882c55b5aba362d468ca814b434a1b60eb5406db7b1b0f7c89b8eb960ebef8b5ac5c6dbdb8745d20bc0083dd39baf67ec757
-
SSDEEP
768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqPOYRmNxt5I52kGEpE0P/xFI0tS2:6j+1NMOtEvwDpjr8ox8UDEpN/jhz
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2536 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1824 2024-07-08_22a5ab6d9ad3ec3233e66fcee2e1640f_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1824 wrote to memory of 2536 1824 2024-07-08_22a5ab6d9ad3ec3233e66fcee2e1640f_cryptolocker.exe 30 PID 1824 wrote to memory of 2536 1824 2024-07-08_22a5ab6d9ad3ec3233e66fcee2e1640f_cryptolocker.exe 30 PID 1824 wrote to memory of 2536 1824 2024-07-08_22a5ab6d9ad3ec3233e66fcee2e1640f_cryptolocker.exe 30 PID 1824 wrote to memory of 2536 1824 2024-07-08_22a5ab6d9ad3ec3233e66fcee2e1640f_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-08_22a5ab6d9ad3ec3233e66fcee2e1640f_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-08_22a5ab6d9ad3ec3233e66fcee2e1640f_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD56726b27cdb7702991cdbb7d6f39c88cf
SHA1abf580ee22511fa908c9422bda1aa31d5edfd2a9
SHA256f540e3b762a3b467a5b542fc3cd327a54a18c64521153adb04baa91ca53a3de1
SHA512d6ac0a613077e55fe34eda48230ef3e694dc1247c749dcbe067d0cea0053d05b2d5f9946d319b364fc4b4322be7909ba6e6292114165513f8c9a4a69a21f2de6