Analysis

  • max time kernel
    150s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    02/02/2024, 19:35

General

  • Target

    2024-02-02_8b36cd4989b778bd268a304ccb5df259_cryptolocker.exe

  • Size

    76KB

  • MD5

    8b36cd4989b778bd268a304ccb5df259

  • SHA1

    8424cead9c840675788bb776f9557b15a047ecf5

  • SHA256

    612f5fa0e12c998b4168b05bccae6a67d80fe3f85daa45b3b406919282948265

  • SHA512

    2b3eebc12f403ef02c3f7e7391af4819fa4d0785ec1c56ba8ef218918caecfb6606754c98cbd91612450593213e111a261033ebd67f2bfe4d40210ca8b418741

  • SSDEEP

    1536:ZzFbxmLPWQMOtEvwDpj386Sj/WprgJN6tZdOyJ3KEWTeLO:ZVxkGOtEvwDpjcaxU

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-02_8b36cd4989b778bd268a304ccb5df259_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-02_8b36cd4989b778bd268a304ccb5df259_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:2836

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    76KB

    MD5

    acba576412f9065f992f35c147352656

    SHA1

    4e6c2880cffe1468b4f642ddddee96447935fc27

    SHA256

    c48ab33412b82ad20e6fbceb390c6481ee961f497f1dc8f6abe9556bdd15226b

    SHA512

    ed85e74735d7976a92e1beddf10bd37d53fc5010b3040a3e93cf24a9dbfcef86607e21036cd5560d8325b9ebb5214ee3e5c37df7a547beca1d43a899f226ca19

  • memory/2024-1-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2024-0-0x00000000001C0000-0x00000000001C3000-memory.dmp

    Filesize

    12KB

  • memory/2024-2-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB

  • memory/2024-5-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2836-15-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2836-18-0x00000000002F0000-0x00000000002F6000-memory.dmp

    Filesize

    24KB

  • memory/2836-17-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB