Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22-07-2024 21:22
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-22_d9e83262c9a0c054ea414a7d158a5b98_cryptolocker.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-07-22_d9e83262c9a0c054ea414a7d158a5b98_cryptolocker.exe
Resource
win10v2004-20240709-en
General
-
Target
2024-07-22_d9e83262c9a0c054ea414a7d158a5b98_cryptolocker.exe
-
Size
49KB
-
MD5
d9e83262c9a0c054ea414a7d158a5b98
-
SHA1
9433d03a1c9c6874b05567d0dd71777d7f0aa348
-
SHA256
bce4ef0149226047e703888333616bed9b61f80f94e2a2b91e2789fb7db8a087
-
SHA512
66d3d08f454903482c229895a073d79e41b1ce0cdbd48bc11cdcb4a4dc8c3e10ec5b88a96de3554f641cf28f6ab23ea9a0302bbb06611eb5d1b28603b10f8417
-
SSDEEP
768:vQz7yVEhs9+js1SQtOOtEvwDpjz9+4/Uth8igNrr42A7n0FmB0nq:vj+jsMQMOtEvwDpj5HczerLO04B9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2816 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1620 2024-07-22_d9e83262c9a0c054ea414a7d158a5b98_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1620 wrote to memory of 2816 1620 2024-07-22_d9e83262c9a0c054ea414a7d158a5b98_cryptolocker.exe 30 PID 1620 wrote to memory of 2816 1620 2024-07-22_d9e83262c9a0c054ea414a7d158a5b98_cryptolocker.exe 30 PID 1620 wrote to memory of 2816 1620 2024-07-22_d9e83262c9a0c054ea414a7d158a5b98_cryptolocker.exe 30 PID 1620 wrote to memory of 2816 1620 2024-07-22_d9e83262c9a0c054ea414a7d158a5b98_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-22_d9e83262c9a0c054ea414a7d158a5b98_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-22_d9e83262c9a0c054ea414a7d158a5b98_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD562f7ac8a1d16b2a7ad61680237d814e9
SHA18657c2fb5075e7a8ba2f7475a2233128d2c2d762
SHA25605eecd8dde2d24132430e6245abd59a17c8623f5d8e92df5946b30eaf39044c9
SHA512049ae23df27b153092d4c1017964dd48189a0feeb75fb449c02bf10a4a882d95a9aeeddbb95247ed287134be213db6cb5068927190129700f59771c9b1e9626a