Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    28/01/2024, 07:42

General

  • Target

    2024-01-28_dac153a312955e0b8b0a072d5d050108_cryptolocker.exe

  • Size

    47KB

  • MD5

    dac153a312955e0b8b0a072d5d050108

  • SHA1

    964d66bb455da21aaff6359175aed18d7f62fbc0

  • SHA256

    d428e8f16323358d956f51af15df22b06118769ee6835f0593ab90d1c549b4a2

  • SHA512

    1aa5ff32fbd32e72be88363bfbcda1fff05fca38fea93317f788c3ee80975451668325c1e0decfa457e51d029f3b09a7059640b602c85463c233b517da863922

  • SSDEEP

    384:icX+ni9VCr5nQI021q4VQBqURYp055TOtOOtEvwDpjqIGR/hHi7/OlI0G/74zpzS:XS5nQJ24LR1bytOOtEvwDpjNbP/0GgM

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Detection of Cryptolocker Samples 3 IoCs
  • Detects executables built or packed with MPress PE compressor 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-28_dac153a312955e0b8b0a072d5d050108_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-28_dac153a312955e0b8b0a072d5d050108_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:3008

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\misid.exe

          Filesize

          47KB

          MD5

          c143f535a11f1e61529837abbe54d12d

          SHA1

          045be2941fd4e7bc890f9cec92187e515a34b88f

          SHA256

          f1aa55b9081d8b0b4a3bf52309561d80582535b5a1212d703b4a87e3b890e1b9

          SHA512

          0b6e28e02bf747406be0af94bef8f13ec2e93ee5c0f5d54f2662729be66f66d4d467e1d83d355a2f186525f4c3dee7638a0101202abfc82fb73a91c14b6a6b6d

        • memory/2368-0-0x0000000000500000-0x000000000050F000-memory.dmp

          Filesize

          60KB

        • memory/2368-1-0x00000000002C0000-0x00000000002C6000-memory.dmp

          Filesize

          24KB

        • memory/2368-2-0x0000000000460000-0x0000000000466000-memory.dmp

          Filesize

          24KB

        • memory/2368-9-0x00000000002C0000-0x00000000002C6000-memory.dmp

          Filesize

          24KB

        • memory/2368-15-0x0000000000500000-0x000000000050F000-memory.dmp

          Filesize

          60KB

        • memory/3008-18-0x0000000000290000-0x0000000000296000-memory.dmp

          Filesize

          24KB

        • memory/3008-17-0x0000000000500000-0x000000000050F000-memory.dmp

          Filesize

          60KB

        • memory/3008-20-0x00000000001D0000-0x00000000001D6000-memory.dmp

          Filesize

          24KB

        • memory/3008-26-0x0000000000500000-0x000000000050F000-memory.dmp

          Filesize

          60KB