Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-01-2024 04:37

General

  • Target

    2024-01-25_730fa93290faf67196a8ded2ffdda599_cryptolocker.exe

  • Size

    100KB

  • MD5

    730fa93290faf67196a8ded2ffdda599

  • SHA1

    5e89f1ce17719bd205b886e4e7060a38f713a41f

  • SHA256

    e9d1089c8cedadb273370d6305eb708311e9366209a4f0ac0487b3b03b0a8728

  • SHA512

    123a2e9a950e51352d3676b723ceda7eb5e2627758c242d7be8edd01cddf045ab7e23e5ddd6156d0fe0164640ed80f2bad5fc6f6f828526e6943f1b5d07f3309

  • SSDEEP

    768:XS5nQJ24LR1bytOOtEvwDpjNbZ7uyA36S7MpxRiWjzUNoB:i5nkFGMOtEvwDpjNbwQEIikgNS

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Detection of Cryptolocker Samples 4 IoCs
  • Detects executables built or packed with MPress PE compressor 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-25_730fa93290faf67196a8ded2ffdda599_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-25_730fa93290faf67196a8ded2ffdda599_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1988
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:2860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    100KB

    MD5

    42aebd7f12914f0ee77bec30f424c386

    SHA1

    71e3f158ca5660e8c330dd51c1544d9182cfdc13

    SHA256

    3e2103cde436d6aa62cb3918fb827c9b1458bcea6d28c39651ab6ee43189b0d2

    SHA512

    78d595150fcb6f9f74c804dbd6a7b9f36da32678a1a7739330663ced0f054e381cb61127c6b302da12d1490a5df57e2dd92194d11c2d24b7f2e8bdd5cd93c156

  • memory/1988-0-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/1988-1-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/1988-2-0x0000000000330000-0x0000000000336000-memory.dmp

    Filesize

    24KB

  • memory/1988-5-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/1988-15-0x0000000000690000-0x000000000069F000-memory.dmp

    Filesize

    60KB

  • memory/1988-14-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/2860-17-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/2860-19-0x0000000000210000-0x0000000000216000-memory.dmp

    Filesize

    24KB

  • memory/2860-21-0x00000000001E0000-0x00000000001E6000-memory.dmp

    Filesize

    24KB

  • memory/2860-27-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB