Analysis

  • max time kernel
    150s
  • max time network
    162s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    05/01/2024, 05:50

General

  • Target

    2024-01-01_c208962bda71c15eddeb577746346d3f_cryptolocker.exe

  • Size

    58KB

  • MD5

    c208962bda71c15eddeb577746346d3f

  • SHA1

    040f00b536e78a597f9a6af61d83714d6ad755e4

  • SHA256

    aa1aed60565659c04fa4b04c3019af7f3e7e7e894dbb1cdc51de8577b424b8de

  • SHA512

    8b74721429b4d8043660dd3bd468bb4a57771c80ab451c0c9f8470aa9296c08a9cc1ade6fd7fd6c38bf84603c7eb2f8607bbb41cf147b962456f6e3acae96334

  • SSDEEP

    1536:Tj+jsMQMOtEvwDpj5HmpJpOUHECgNMo0vp2EMT7P:TCjsIOtEvwDpj5HE/OUHnSMo

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-01_c208962bda71c15eddeb577746346d3f_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-01_c208962bda71c15eddeb577746346d3f_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1640
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:2552

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    58KB

    MD5

    a678d617ac7cfa937faf78e73859e74a

    SHA1

    ee57264b5696a75afdc54e133aa865f053a3b643

    SHA256

    d54b2a3bd8d147a3533ef3b20645147d4c1ba4cfede6196c5c555a98a7e64e8a

    SHA512

    b18c555358c996176deca251ed73e5eeecf7982c9decfcc2dff69a42bb302a777b4345745b2a176a92a435cb58e196009257a5e78c118c6d10828e591fbfb40d

  • memory/1640-0-0x0000000000500000-0x000000000050E000-memory.dmp

    Filesize

    56KB

  • memory/1640-1-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/1640-2-0x00000000005F0000-0x00000000005F6000-memory.dmp

    Filesize

    24KB

  • memory/1640-3-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/1640-15-0x0000000000500000-0x000000000050E000-memory.dmp

    Filesize

    56KB

  • memory/2552-16-0x0000000000500000-0x000000000050E000-memory.dmp

    Filesize

    56KB

  • memory/2552-18-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2552-19-0x0000000000270000-0x0000000000276000-memory.dmp

    Filesize

    24KB

  • memory/2552-26-0x0000000000500000-0x000000000050E000-memory.dmp

    Filesize

    56KB