Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25/01/2024, 11:22

General

  • Target

    2024-01-25_107458889576b27798377f93e7f05c82_cryptolocker.exe

  • Size

    61KB

  • MD5

    107458889576b27798377f93e7f05c82

  • SHA1

    698315c283288f74779b26b0ac457bdc4b6f516a

  • SHA256

    3cdc5b3e81127e93f5ab6f98f3d350fa600717853155deb4e5ab8ad6df878e20

  • SHA512

    e077b28443f88ef76a44e6c94881a2431364a7327b4d22b2bf3cc772f974069b6517ee5b176843ecfa929da7ad9ea0e88aa0c5cbd5e332383c69583dcb221cc8

  • SSDEEP

    1536:Tj+jsMQMOtEvwDpj5HmpJpOUHECgNMo0vp2EMTIr3:TCjsIOtEvwDpj5HE/OUHnSMN

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-25_107458889576b27798377f93e7f05c82_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-25_107458889576b27798377f93e7f05c82_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:2868

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\misid.exe

          Filesize

          61KB

          MD5

          8c894f036910c6c91ca9f138498000df

          SHA1

          00a70f7f4f8bb99bf16d65a098ecc8660c999290

          SHA256

          e6610a17393303a0bd8ac1218c14d9325d932dde4d2a259a41b802535dc95937

          SHA512

          9f75b23c0ca9c9ac3ac5fcfde5fdfe83bf5610daa004bfe128f07127fd07030e283dc13768cc37c21da6433de7aad2b3ab76f925d25f2fdcc3a30a19f54992da

        • memory/2044-0-0x0000000000500000-0x000000000050E000-memory.dmp

          Filesize

          56KB

        • memory/2044-1-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/2044-2-0x0000000000300000-0x0000000000306000-memory.dmp

          Filesize

          24KB

        • memory/2044-9-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/2044-15-0x0000000000500000-0x000000000050E000-memory.dmp

          Filesize

          56KB

        • memory/2868-17-0x0000000000340000-0x0000000000346000-memory.dmp

          Filesize

          24KB

        • memory/2868-18-0x0000000000500000-0x000000000050E000-memory.dmp

          Filesize

          56KB