Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    28/01/2024, 01:43

General

  • Target

    2024-01-28_24c967d78f3e74bba553445d6b720c9d_cryptolocker.exe

  • Size

    124KB

  • MD5

    24c967d78f3e74bba553445d6b720c9d

  • SHA1

    112d027ad72e31564ffca70ac4f81df98f9ccab6

  • SHA256

    9263905bd92fed29dac6be2445f72190c1004bc634921c82115f1a9a53551801

  • SHA512

    0733d40f1d42a93a02be14035e0edaddb820c2f0115d66b6e520d141a2bde5b3dc25399bf017cc0341376545f11baaf883575955a16ec324b1fa8021f909dd1d

  • SSDEEP

    1536:gUj+AIMOtEvwDpjNbwQEIPlemUhYwkkxGBpa:vCA9OtEvwDpje

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-28_24c967d78f3e74bba553445d6b720c9d_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-28_24c967d78f3e74bba553445d6b720c9d_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3032
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:2116

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    125KB

    MD5

    d7bb0b1879ef6517b1b0c123528a0b56

    SHA1

    73e24882b5a5656fb8381751e2247845794738aa

    SHA256

    411b4719f8ba29bb878f20ebe760da0fc33c33eb19799c9062438978efa6e5d0

    SHA512

    a96839e2288345e759a323809ac80695b33ca180f61d2bd9cb83f147b6eb8881c82b860c374deadcb11aab4c3c929deda4c014f9c54441c851ee6b8401af2d7f

  • memory/2116-15-0x0000000000520000-0x0000000000526000-memory.dmp

    Filesize

    24KB

  • memory/2116-17-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/3032-0-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/3032-1-0x0000000000380000-0x0000000000386000-memory.dmp

    Filesize

    24KB

  • memory/3032-8-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB