Analysis
-
max time kernel
151s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/07/2024, 10:27
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-23_5670c283feadc9c204140b2ea2b2ef04_cryptolocker.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-07-23_5670c283feadc9c204140b2ea2b2ef04_cryptolocker.exe
Resource
win10v2004-20240704-en
General
-
Target
2024-07-23_5670c283feadc9c204140b2ea2b2ef04_cryptolocker.exe
-
Size
72KB
-
MD5
5670c283feadc9c204140b2ea2b2ef04
-
SHA1
cec7d06632ef79a410105f444ffbdb174cb579cc
-
SHA256
4d92ff0e81457ecaf52967eb7ba976b05ad0741392eec4b9d4cd910922f277a8
-
SHA512
f449cc9c1280d4389b694ecff2c48d70cc207b5f9db45b7519cecc85a7a501e33045f50f4b13c0b34d599bc762eea033423e9f6c9bfca1bc0f6ff9105f18e8c1
-
SSDEEP
768:vQz7yVEhs9+js1SQtOOtEvwDpjz9+4ZPsED3VK2+ZtyOjgO4r9vFAg2rq2g1B/Rb:vj+jsMQMOtEvwDpj5HZYTjipvF24D
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2748 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1188 2024-07-23_5670c283feadc9c204140b2ea2b2ef04_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1188 wrote to memory of 2748 1188 2024-07-23_5670c283feadc9c204140b2ea2b2ef04_cryptolocker.exe 30 PID 1188 wrote to memory of 2748 1188 2024-07-23_5670c283feadc9c204140b2ea2b2ef04_cryptolocker.exe 30 PID 1188 wrote to memory of 2748 1188 2024-07-23_5670c283feadc9c204140b2ea2b2ef04_cryptolocker.exe 30 PID 1188 wrote to memory of 2748 1188 2024-07-23_5670c283feadc9c204140b2ea2b2ef04_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-23_5670c283feadc9c204140b2ea2b2ef04_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-23_5670c283feadc9c204140b2ea2b2ef04_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5a655e38dd21d2982e8251b2158b8d277
SHA1d1237a766a3759f6cf5ef1f15b3d314e9e1e6355
SHA256bba3f97728cc55d4f8bceba49d71d739be4533c3a06323644d6c1f08d8fc75ca
SHA512cbd05e888a474e7d8b519ac27d6cc7d7bb1bb74c27d5b58c538ea5dcd574bcccea6c77c0f21b6838dcf4a3c29a441680ea72d3a971c3e5526c77274fa861cf87