Analysis

  • max time kernel
    0s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    11/01/2024, 05:57

General

  • Target

    2024-01-10_e27f9d397016cedc398bec4036d1a94f_cryptolocker.exe

  • Size

    77KB

  • MD5

    e27f9d397016cedc398bec4036d1a94f

  • SHA1

    dac50d4616a7d341c1d7464fa2bcd173440e77b8

  • SHA256

    3bd47ef445c093a82daa18dd9ee8d9c4a4c929a34392fdcc6cca88dd82252612

  • SHA512

    8998c7c6e326106daa4074491b586687a91a93ec21314ef791976554d55cf265d48397262cdcfd618e6e55d6328fbf3575ef029b6f8fb0966c9927eafd072af8

  • SSDEEP

    1536:vj+jsMQMOtEvwDpj5HwYYTjipvF2hBfWafHT:vCjsIOtEvwDpj5H9YvQd2H

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\misid.exe
    "C:\Users\Admin\AppData\Local\Temp\misid.exe"
    1⤵
    • Executes dropped EXE
    PID:2976
  • C:\Users\Admin\AppData\Local\Temp\2024-01-10_e27f9d397016cedc398bec4036d1a94f_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-10_e27f9d397016cedc398bec4036d1a94f_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3052

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\misid.exe

          Filesize

          77KB

          MD5

          a789ebf31b676ad2c6637c9f15f4626c

          SHA1

          224489e07d45e84a4d6d4221e9c6aaa68a190db2

          SHA256

          406346e2663f942806603e574578a6d7cbb1d397495b1d0096f61b1af8113f94

          SHA512

          9e5cc83efb45e54c7a7f2eeacdc7d4ba4b8edfe2a28e7ca66f8e91f4158bd6cf5de2a8511e94fccb858ef4152deb74ae412b857bbd391f9082131aed91fd6789

        • memory/2976-22-0x0000000000370000-0x0000000000376000-memory.dmp

          Filesize

          24KB

        • memory/2976-15-0x00000000004B0000-0x00000000004B6000-memory.dmp

          Filesize

          24KB

        • memory/3052-4-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/3052-1-0x0000000000380000-0x0000000000386000-memory.dmp

          Filesize

          24KB

        • memory/3052-0-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB