Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    27/01/2024, 20:26

General

  • Target

    2024-01-27_47b5a1e8c2fb24b760bb4449d9a04992_cryptolocker.exe

  • Size

    84KB

  • MD5

    47b5a1e8c2fb24b760bb4449d9a04992

  • SHA1

    dcf9e9c02d7f62097f00ec6591bc87b7e6198145

  • SHA256

    5c91905bb1f8fd908f73dbbfa8821b1fae69da9cc25c9596b6e7c40ddcd499c6

  • SHA512

    54ff1b39d4602b1dfd5ee9fe256662ca895a2343beb49b0088414aa46252b1264e7ba883fc560d5c8d28a3dea2bfece44d876b5116a9f846a19d9f5b8001f5fa

  • SSDEEP

    768:XS5nQJ24LR1bytOOtEvwDpjNbZ7uyA36S7MpxRXrZSUfFKazNclMjNUvx5/p:i5nkFGMOtEvwDpjNbwQEI8UtzNcO8J

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 6 IoCs
  • Detection of Cryptolocker Samples 3 IoCs
  • Detects executables built or packed with MPress PE compressor 6 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-27_47b5a1e8c2fb24b760bb4449d9a04992_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-27_47b5a1e8c2fb24b760bb4449d9a04992_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1904
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:2172

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    84KB

    MD5

    a897233daf408eaf7d402e3ef751bd76

    SHA1

    9b54001c15b2847886d2e89a95305eafe3958466

    SHA256

    a94b01e11756f91b90e7c3d2c20b11fd153768a1e579f069aae073eeb6ac19b3

    SHA512

    902aed885c05b5ac36ea8b3667af5b894b2430013572236a064b6db87a265526f6cb4e1e2db310ab45aa655fcd2f5b438f2d26a121e4f04d27c30e7c14c1c467

  • memory/1904-0-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/1904-1-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/1904-2-0x0000000000290000-0x0000000000296000-memory.dmp

    Filesize

    24KB

  • memory/1904-9-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/1904-12-0x0000000000670000-0x000000000067F000-memory.dmp

    Filesize

    60KB

  • memory/1904-16-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/1904-27-0x0000000000670000-0x000000000067F000-memory.dmp

    Filesize

    60KB

  • memory/2172-18-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/2172-19-0x0000000000210000-0x0000000000216000-memory.dmp

    Filesize

    24KB

  • memory/2172-26-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB