Analysis

  • max time kernel
    0s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/01/2024, 12:19

General

  • Target

    2024-01-06_fbd7ae83647d22b085264c982f290c21_cryptolocker.exe

  • Size

    87KB

  • MD5

    fbd7ae83647d22b085264c982f290c21

  • SHA1

    e0e28da863e314984df61877225e0133a7c64cd8

  • SHA256

    3db746457a19b5f11c69fae4310ad1f6fdc6dbc5e602fa4a68243bbc30a8aa08

  • SHA512

    74e99be368faca5836ebbe728a539b56bce4a209617bbea98b3ea77582769de1fbf27ecb3b366c892b7a84ea0ada809b6d037604bc031bddc268f7b21769a5ec

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRMy8w:zCsanOtEvwDpjk

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-06_fbd7ae83647d22b085264c982f290c21_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-06_fbd7ae83647d22b085264c982f290c21_cryptolocker.exe"
    1⤵
      PID:4456
      • C:\Users\Admin\AppData\Local\Temp\misid.exe
        "C:\Users\Admin\AppData\Local\Temp\misid.exe"
        2⤵
          PID:3140

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/3140-20-0x00000000005E0000-0x00000000005E6000-memory.dmp

              Filesize

              24KB

            • memory/3140-19-0x00000000004D0000-0x00000000004D6000-memory.dmp

              Filesize

              24KB

            • memory/3140-60-0x0000000000500000-0x0000000000510000-memory.dmp

              Filesize

              64KB

            • memory/4456-0-0x0000000000500000-0x0000000000510000-memory.dmp

              Filesize

              64KB

            • memory/4456-3-0x0000000000850000-0x0000000000856000-memory.dmp

              Filesize

              24KB

            • memory/4456-2-0x00000000006A0000-0x00000000006A6000-memory.dmp

              Filesize

              24KB

            • memory/4456-1-0x00000000006A0000-0x00000000006A6000-memory.dmp

              Filesize

              24KB

            • memory/4456-17-0x0000000000500000-0x0000000000510000-memory.dmp

              Filesize

              64KB