Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    29/01/2024, 07:43

General

  • Target

    2024-01-29_f1d51c6de1e37799a6fd7764174a2f55_cryptolocker.exe

  • Size

    127KB

  • MD5

    f1d51c6de1e37799a6fd7764174a2f55

  • SHA1

    8d4318ee703cb6b928869349d0ba5fa0ca864ff4

  • SHA256

    c6f0187088cf115eada4db03b30136f65b118533d3d1363aed71afa08b781754

  • SHA512

    9ce54e4b0840c3d49c6fce81aaafd6504ce42278e58ed000350a96834d77dbb678dc68dd11e1fb2249985ddaf2a1298e71c9b4d8b63537a403b5133b7c04e879

  • SSDEEP

    1536:vj+jsMQMOtEvwDpj5HwYYTjipvF2hBfIuBKLUYOVbvh//o:vCjsIOtEvwDpj5H9YvQd2Ri

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 3 IoCs
  • Detection of Cryptolocker Samples 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\misid.exe
    "C:\Users\Admin\AppData\Local\Temp\misid.exe"
    1⤵
    • Executes dropped EXE
    • Modifies system certificate store
    PID:3056
  • C:\Users\Admin\AppData\Local\Temp\2024-01-29_f1d51c6de1e37799a6fd7764174a2f55_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-29_f1d51c6de1e37799a6fd7764174a2f55_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    45KB

    MD5

    dc38d629e51926a750b443772d7c8c65

    SHA1

    2868765523e76b2e6706f18ecb665f4631a00d00

    SHA256

    21a98ea45d4ca76fc03cd769b01345da379395b41295e1506644149d0a378883

    SHA512

    beb8198332e8771a0475a925a4b31a8a80df9a04dc889442d1a4e024b1b66709acc3e347d50af1868d5d0c351d489cd454fc2523f752ea9dec56b9a9d6048ef4

  • C:\Users\Admin\AppData\Local\Temp\Tar107A.tmp

    Filesize

    44KB

    MD5

    3fd8ec8f21a426bf799d8a5045388b0a

    SHA1

    81e4ec44dd2125e6a6544984367acbdfb1f24cbb

    SHA256

    b7199b0ab2d7fdc6be017a6fff2b89481adcf958bda88fd02088e53f2aeb99de

    SHA512

    4594880528eda8c8a8695bc640b8af3de95dc8e6ccf9f82f5e40af4c580c0fb9652ad7d2ac4899e09bd559bd63fd0c2814137df930be878622fd3ffcf566650b

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    77KB

    MD5

    1d3a2b6e8f68277cfc325dca5f68a25d

    SHA1

    745f592fd192118e546c77239717615a5f71d51b

    SHA256

    5aba8311c783dd6c60f2249baed274343974f426098e5316fe8e687f91eaeb28

    SHA512

    b17040bd7baf480b50f1b9e6d78bde4486ca5fae4d1527da4ab8ab72b526ff684802983b7914a5332dfb668d0f9e1ab73c49a26a3d49a4251947ae883dec3786

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    38KB

    MD5

    d30128e835ae7c1ec74f61292747b314

    SHA1

    d716614f70419389b43fb327660e09637b08227f

    SHA256

    fd09cb2023d0ec7c5ad29a0b4c1553de8c8273bfcebd15b5ff8f858cf08068b5

    SHA512

    6cbada272d685e7d7890cf02bde769018984a1c4cd3bc3bc8c5f149f3253a777056c1edec6ac8c3197143e0fd814581e4c247088c9c90c326661e7de001e8c87

  • \Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    66KB

    MD5

    b4d5ec9713e432c2dd9ae83f4dfece2e

    SHA1

    75760825b83f81e1dc8b7062f254d16ea71a078d

    SHA256

    11c267dc0383bf37c2fbe72f8c9b089b81e5518153cf654d46bf7f2cfff36f5b

    SHA512

    41196734eacf53ad064fb060cd2adf37df87cdcb52a5a10ccb7fd173b38c8793c67d75d48759ecee3a86ef6971398e0b2a73162f27df10004ccdac7711329d8e

  • memory/1896-7-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/1896-1-0x0000000000380000-0x0000000000386000-memory.dmp

    Filesize

    24KB

  • memory/1896-0-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/3056-15-0x0000000000480000-0x0000000000486000-memory.dmp

    Filesize

    24KB

  • memory/3056-22-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB