Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    14-02-2024 03:06

General

  • Target

    2024-02-14_f461ca08a8f3d7c6ebbfc0b6ee2d820e_cryptolocker.exe

  • Size

    84KB

  • MD5

    f461ca08a8f3d7c6ebbfc0b6ee2d820e

  • SHA1

    230e89d21ffbff4a92fe1964f560e88e8bcaf17d

  • SHA256

    dcd1b6d8dca55844511dc887574115274cf482c9641a49adfbfcbf62eb1dd3b8

  • SHA512

    43bf566dbe11142a8e97ae02afa5f9157e4de5210c36f19a5980cbde6e349879b79aed319e1cecee73e1c9fda189ab5b3ad1b96f2a9f667a2845f88016ae6ada

  • SSDEEP

    768:XS5nQJ24LR1bytOOtEvwDpjNbZ7uyA36S7MpxRXrZSUfFKazNclMjNUvP2x:i5nkFGMOtEvwDpjNbwQEI8UtzNcO82

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 6 IoCs
  • Detection of Cryptolocker Samples 3 IoCs
  • Detects executables built or packed with MPress PE compressor 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-14_f461ca08a8f3d7c6ebbfc0b6ee2d820e_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-14_f461ca08a8f3d7c6ebbfc0b6ee2d820e_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2972
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:2136

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    84KB

    MD5

    60345ca0dd8ad4c2e35458f3e68a74ef

    SHA1

    8b2bae410629067bfe39659c281075e04029af1c

    SHA256

    d3ab22c83b56c11b31b96495aa7312a73e75977be2ac92ae65965bb871b3b5f7

    SHA512

    4de904aa42b1e3421fa802fb08fae2221c9d440a6224e7fea81982e9d6369d4605718ca8155a176841c7040530b0fbc48a47b48529be45b56b1df7ad3f8f51eb

  • memory/2136-17-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/2136-19-0x00000000002B0000-0x00000000002B6000-memory.dmp

    Filesize

    24KB

  • memory/2136-22-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2136-27-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/2972-0-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/2972-1-0x0000000000420000-0x0000000000426000-memory.dmp

    Filesize

    24KB

  • memory/2972-3-0x0000000000450000-0x0000000000456000-memory.dmp

    Filesize

    24KB

  • memory/2972-2-0x0000000000420000-0x0000000000426000-memory.dmp

    Filesize

    24KB

  • memory/2972-15-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/2972-13-0x00000000008B0000-0x00000000008BF000-memory.dmp

    Filesize

    60KB

  • memory/2972-28-0x00000000008B0000-0x00000000008BF000-memory.dmp

    Filesize

    60KB