Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    13/02/2024, 04:54

General

  • Target

    2024-02-13_6a4c8d6ac20388fd061c7f6db9a8437b_cryptolocker.exe

  • Size

    37KB

  • MD5

    6a4c8d6ac20388fd061c7f6db9a8437b

  • SHA1

    91c496af865ee3c113a471af0ff6a5a4ca23636a

  • SHA256

    bf7261febfb6f3450c28b74e8a819b64cfe933a7be5972a5c1cb05974c9ca7a0

  • SHA512

    5fd1b076e6097c764e2e75aa80ca057ec5f3e2b5457895add6b4627237e1740c72d110bf7ef471a8b49d71e2beb81b5c3b9bf1bd27860e6fd5189e9f33b6d97c

  • SSDEEP

    768:bxNQIE0eBhkL2Fo1CCwgfjOg1tsJ6zeen7JEgx3O/:bxNrC7kYo1Fxf3s06gY/

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-13_6a4c8d6ac20388fd061c7f6db9a8437b_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-13_6a4c8d6ac20388fd061c7f6db9a8437b_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Users\Admin\AppData\Local\Temp\pissa.exe
      "C:\Users\Admin\AppData\Local\Temp\pissa.exe"
      2⤵
      • Executes dropped EXE
      PID:3004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\pissa.exe

    Filesize

    37KB

    MD5

    54b4902506544661277c552292cea67e

    SHA1

    3c1def335d5b493fc80eec6aa290b580ab6666c8

    SHA256

    a75defae704656c39fe04344654429c504216d4549bb6581e27b0f28d5a522f2

    SHA512

    175f473818e06d1874edecf808d29d341bfdfa9bcd5df57a6d9c4355535271b133736fa19f4718846aef961fea0a62c7fc8f970cd52f08ac9b20564d283b0cd4

  • memory/2232-0-0x0000000000530000-0x0000000000536000-memory.dmp

    Filesize

    24KB

  • memory/2232-1-0x0000000000540000-0x0000000000546000-memory.dmp

    Filesize

    24KB

  • memory/2232-8-0x0000000000530000-0x0000000000536000-memory.dmp

    Filesize

    24KB

  • memory/3004-15-0x0000000000320000-0x0000000000326000-memory.dmp

    Filesize

    24KB

  • memory/3004-22-0x0000000000310000-0x0000000000316000-memory.dmp

    Filesize

    24KB