Analysis

  • max time kernel
    142s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-08-2023 19:34

General

  • Target

    4627a0cc0fe1f5613f14a5f0ae1fa197_cryptolocker_JC.exe

  • Size

    44KB

  • MD5

    4627a0cc0fe1f5613f14a5f0ae1fa197

  • SHA1

    e4e8bad800056c494435c073f231a2b366542020

  • SHA256

    d13c4a28432f1c0900a0ba5d551984287de169ee64530ba1b9065a90183ed4d4

  • SHA512

    e600c5687e64742cf586775639fff117bef14711f8acf7b29ac3d72f76f8f3657a2f27ea0f3227fb33eea71025dfd524c8144d4b7615179c2cb13ab1006af52e

  • SSDEEP

    768:UEEmoQDj/xnMp+yptndwe/PWQtOOtEvwDpjZ1UKXJ0T5bano56:ZzFbxmLPWQMOtEvwDpjbtJ0Z756

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4627a0cc0fe1f5613f14a5f0ae1fa197_cryptolocker_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\4627a0cc0fe1f5613f14a5f0ae1fa197_cryptolocker_JC.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3924
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:4720

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    44KB

    MD5

    490484b323c0d45fb986cabf9ca7c327

    SHA1

    c9c936d1eb4b18e9611c237f2bd3d06df6dfef47

    SHA256

    55c0d967be3bb77dd0c68bd52b58cfdd25e71b37fe858187a3b040faa198b3f4

    SHA512

    a7c3417a4de81c1b8f71ebde14038b11eb369bf2e040f763c5e295d5b7c53a2e8384df0a319e621f71bcd633fdb2ea6d5c3eea5607dc2c306c44a9523fc27b87

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    44KB

    MD5

    490484b323c0d45fb986cabf9ca7c327

    SHA1

    c9c936d1eb4b18e9611c237f2bd3d06df6dfef47

    SHA256

    55c0d967be3bb77dd0c68bd52b58cfdd25e71b37fe858187a3b040faa198b3f4

    SHA512

    a7c3417a4de81c1b8f71ebde14038b11eb369bf2e040f763c5e295d5b7c53a2e8384df0a319e621f71bcd633fdb2ea6d5c3eea5607dc2c306c44a9523fc27b87

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    44KB

    MD5

    490484b323c0d45fb986cabf9ca7c327

    SHA1

    c9c936d1eb4b18e9611c237f2bd3d06df6dfef47

    SHA256

    55c0d967be3bb77dd0c68bd52b58cfdd25e71b37fe858187a3b040faa198b3f4

    SHA512

    a7c3417a4de81c1b8f71ebde14038b11eb369bf2e040f763c5e295d5b7c53a2e8384df0a319e621f71bcd633fdb2ea6d5c3eea5607dc2c306c44a9523fc27b87

  • C:\Users\Admin\AppData\Local\Temp\misids.exe

    Filesize

    315B

    MD5

    a34ac19f4afae63adc5d2f7bc970c07f

    SHA1

    a82190fc530c265aa40a045c21770d967f4767b8

    SHA256

    d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3

    SHA512

    42e53d96e5961e95b7a984d9c9778a1d3bd8ee0c87b8b3b515fa31f67c2d073c8565afc2f4b962c43668c4efa1e478da9bb0ecffa79479c7e880731bc4c55765

  • memory/3924-139-0x0000000002240000-0x0000000002246000-memory.dmp

    Filesize

    24KB

  • memory/3924-136-0x0000000000490000-0x0000000000493000-memory.dmp

    Filesize

    12KB

  • memory/3924-138-0x0000000002210000-0x0000000002216000-memory.dmp

    Filesize

    24KB

  • memory/3924-155-0x0000000000490000-0x0000000000493000-memory.dmp

    Filesize

    12KB

  • memory/3924-137-0x0000000002210000-0x0000000002216000-memory.dmp

    Filesize

    24KB

  • memory/4720-153-0x0000000002210000-0x0000000002216000-memory.dmp

    Filesize

    24KB

  • memory/4720-157-0x0000000000560000-0x0000000000566000-memory.dmp

    Filesize

    24KB

  • memory/4720-156-0x0000000002070000-0x0000000002076000-memory.dmp

    Filesize

    24KB

  • memory/4720-185-0x0000000002210000-0x0000000002216000-memory.dmp

    Filesize

    24KB