Analysis

  • max time kernel
    0s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    10-01-2024 06:02

General

  • Target

    2024-01-09_d7e5446e51445733f6b34dbebc4f8594_cryptolocker.exe

  • Size

    37KB

  • MD5

    d7e5446e51445733f6b34dbebc4f8594

  • SHA1

    359bec58dc5d10b6ecfbf6a84427940fbcf7c722

  • SHA256

    dedd529b3d41c117322cac6254071e0d1e40a79e88fcdfa000b0ba3d87060051

  • SHA512

    90e9a461940900fff60e00fbee57695574371c12a3843a670b623bea9a61bd9033bb4c80ffbfb08c4923ca59186b1799cf83655683e312fcd1f7dec29a0db2bb

  • SSDEEP

    768:UEEmoQDj/xnMp+yptndwe/PWQtOOtEvwDpjLenQLn:ZzFbxmLPWQMOtEvwDpjLeUn

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\misid.exe
    "C:\Users\Admin\AppData\Local\Temp\misid.exe"
    1⤵
    • Executes dropped EXE
    PID:2192
  • C:\Users\Admin\AppData\Local\Temp\2024-01-09_d7e5446e51445733f6b34dbebc4f8594_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-09_d7e5446e51445733f6b34dbebc4f8594_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    37KB

    MD5

    907cff5fed8676aa4a410094e828df2b

    SHA1

    5b5c7996ddb5a006f453a8f3608e4923245c0a50

    SHA256

    abb704922a1be1adf6a45200520157b5e7cd70e21d0694cfce53e0297167732a

    SHA512

    7fda78c786f21e221b1903cceb58628e76d0aaa81cc8d975f94ec5eeb86a4f61eae002472e083714e9375388dc36e8b5530fea874a2f7e604cabf8b503dd8152

  • memory/816-0-0x0000000000440000-0x0000000000446000-memory.dmp

    Filesize

    24KB

  • memory/816-2-0x0000000000480000-0x0000000000486000-memory.dmp

    Filesize

    24KB

  • memory/816-1-0x0000000000440000-0x0000000000446000-memory.dmp

    Filesize

    24KB

  • memory/2192-15-0x0000000000290000-0x0000000000296000-memory.dmp

    Filesize

    24KB

  • memory/2192-21-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB