Analysis

  • max time kernel
    1s
  • max time network
    9s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/02/2024, 03:51

General

  • Target

    2024-02-12_24bbbf81f704f533f80d9f7fad20b48f_cryptolocker.exe

  • Size

    90KB

  • MD5

    24bbbf81f704f533f80d9f7fad20b48f

  • SHA1

    1938ea641a9d116e4d0687be0cafa5496f7c4820

  • SHA256

    353a4dae7a485d36f25f3ec87f136952c0c7fe6ef77c886de8b9d3e34080ff29

  • SHA512

    5922af8c954af5a46879355f5516fec920b7bb6e64f785c4c698c21768b8159677475c262ed64a98af0275eb12ef297af5d1f7272198e51ff1242395472055db

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRMy87p:zCsanOtEvwDpjp

Score
9/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 3 IoCs
  • Detection of Cryptolocker Samples 3 IoCs
  • UPX dump on OEP (original entry point) 3 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-12_24bbbf81f704f533f80d9f7fad20b48f_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-12_24bbbf81f704f533f80d9f7fad20b48f_cryptolocker.exe"
    1⤵
      PID:5020
      • C:\Users\Admin\AppData\Local\Temp\misid.exe
        "C:\Users\Admin\AppData\Local\Temp\misid.exe"
        2⤵
          PID:3836

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\misid.exe

              Filesize

              90KB

              MD5

              49357245e906813acc5c7474d250c6eb

              SHA1

              7e5fdf1b148c8b48eba6eb4f5e13c8d1533be3e0

              SHA256

              335600f93b303dd23fed43ea50c984b2f6b4fe937d5633be6d146b3a68b5746d

              SHA512

              aecf4015667837839e39c7e72c8700e6eaa4c54c72eae84cf91e8249cd5b3bdafd0a7eda39725d7b05df6c75d3e0b7d1074b65ddcbd3c31b8c812958c73cee42

            • memory/5020-0-0x0000000000500000-0x0000000000510000-memory.dmp

              Filesize

              64KB

            • memory/5020-1-0x0000000000670000-0x0000000000676000-memory.dmp

              Filesize

              24KB

            • memory/5020-2-0x0000000000670000-0x0000000000676000-memory.dmp

              Filesize

              24KB

            • memory/5020-3-0x0000000000760000-0x0000000000766000-memory.dmp

              Filesize

              24KB

            • memory/5020-17-0x0000000000500000-0x0000000000510000-memory.dmp

              Filesize

              64KB