Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    10/01/2024, 05:58

General

  • Target

    2024-01-09_951fee48f3b71e559277458a83a8adfe_cryptolocker.exe

  • Size

    64KB

  • MD5

    951fee48f3b71e559277458a83a8adfe

  • SHA1

    5b69d7e2ffc76e89ba7972f0f417b5e1d828f167

  • SHA256

    af67ee124a582e7e3999164a79f95b3ddcdfe3fd36ad158f584f680ed2ca1d06

  • SHA512

    6aaba0e26eef32605a7f2d80661c5a1629fbc0550bcb4a67717c2588ce4865484cb0a2002527f5ec10dc6108dab6a14a9fb89b245b647cf0dfc76e5c2e52c683

  • SSDEEP

    1536:vj+jsMQMOtEvwDpj5HyCyh7vtRJ4BqKb1knzhl:vCjsIOtEvwDpj5Hv0j

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\misid.exe
    "C:\Users\Admin\AppData\Local\Temp\misid.exe"
    1⤵
    • Executes dropped EXE
    PID:2160
  • C:\Users\Admin\AppData\Local\Temp\2024-01-09_951fee48f3b71e559277458a83a8adfe_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-09_951fee48f3b71e559277458a83a8adfe_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    41KB

    MD5

    2ad1943458af1c302ca22d4b9c7cffad

    SHA1

    c74c5429f5954534484ac8f747a4e61146d43650

    SHA256

    be8d60b9d20584c389547b73a96b8534d02d51ee9a787d034dacad6fa18feb93

    SHA512

    427014c386f626f7047e6ad8f4cac2c94968cd7d35a2eb7a21066d438f029ca79d852bb557ca0e910d9bd1efd31863eae92b9e6b896919b686dc0d3722fae148

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    64KB

    MD5

    246049541e3f763cd0d083a95d70ab2c

    SHA1

    68196c0d838e97fc26e1f0072527d1a5eec6a83e

    SHA256

    1c46589d653a9d14778048449988c083037f997bfa1fa44fc0114a64b5d68c8e

    SHA512

    34d73e8f9edb689bfb631277289e854ae61f2340ca3b43f4b2da997ee31f11798ff664fc6cdc0dd953862dc93db8575d1c8cbc7fa258e8a552214be218a67e17

  • \Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    37KB

    MD5

    f9acc7adc1b16dabacac7117d3773788

    SHA1

    6fe9a16122080dc701b61dff64251366a248cb74

    SHA256

    011045edbb6ee5c5dfe5e0feceb7310e271436a0c208e494658c4fc899997105

    SHA512

    0fe57b898853a27eb0b10195bbb676a58b30b3c931638620bd293e1f8941155be5062c14ad06b36e2b4484048a8d7c532d40c17dbe60cb570b8e99b234c727d8

  • memory/1972-2-0x0000000000460000-0x0000000000466000-memory.dmp

    Filesize

    24KB

  • memory/1972-1-0x0000000000420000-0x0000000000426000-memory.dmp

    Filesize

    24KB

  • memory/1972-0-0x0000000000420000-0x0000000000426000-memory.dmp

    Filesize

    24KB

  • memory/2160-19-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2160-15-0x00000000004C0000-0x00000000004C6000-memory.dmp

    Filesize

    24KB