Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    03-02-2024 01:24

General

  • Target

    2024-02-03_3d1742fa63a47fdcd9fe643261606a45_cryptolocker.exe

  • Size

    42KB

  • MD5

    3d1742fa63a47fdcd9fe643261606a45

  • SHA1

    9344c0913f4cf00674a0e0301b78df7113050ea1

  • SHA256

    9382d470e51b167b97920361cae7757ca0846b315aad97a04edc531342721d4e

  • SHA512

    a4e2ea9f8e7208732144b1fc095c7d119e703576138c7fe34d466509af4da01d990d3f4ee03d98d4f5119017ca19a87fd43fe32de754cd0310fc796813cd9a12

  • SSDEEP

    768:bxNQIE0eBhkL2Fo1CCwgfjOg1tsJ6zeen754XcwxbFp1Yvb9w:bxNrC7kYo1Fxf3s05rwxbF7Yvbe

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-03_3d1742fa63a47fdcd9fe643261606a45_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-03_3d1742fa63a47fdcd9fe643261606a45_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3020
    • C:\Users\Admin\AppData\Local\Temp\pissa.exe
      "C:\Users\Admin\AppData\Local\Temp\pissa.exe"
      2⤵
      • Executes dropped EXE
      PID:2256

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\pissa.exe

    Filesize

    42KB

    MD5

    735c239936e9de8681c97124f23caf61

    SHA1

    b54053a9fd3001a1f0c9ac34060a28bf7d1ae656

    SHA256

    61ec603e2719e6fb5951d51a73e93527f49e5132719dd792df8067fda4777abe

    SHA512

    00251aa9f163aef794c4b6b8d4bba2a0934bc8571b4021ebc9971b952abf5453d5a3cb422f7f6245905b6b0b9352340d28cb77094659c891d8a222636e695d73

  • memory/2256-16-0x00000000005C0000-0x00000000005C6000-memory.dmp

    Filesize

    24KB

  • memory/2256-15-0x00000000003D0000-0x00000000003D6000-memory.dmp

    Filesize

    24KB

  • memory/3020-0-0x0000000000360000-0x0000000000366000-memory.dmp

    Filesize

    24KB

  • memory/3020-1-0x0000000000580000-0x0000000000586000-memory.dmp

    Filesize

    24KB

  • memory/3020-8-0x0000000000360000-0x0000000000366000-memory.dmp

    Filesize

    24KB