Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    17/02/2024, 05:44

General

  • Target

    2024-02-17_ff060947d6ae1a0d8cd5ac4ff00d9d77_cryptolocker.exe

  • Size

    47KB

  • MD5

    ff060947d6ae1a0d8cd5ac4ff00d9d77

  • SHA1

    107430f193dbc85988713e5d6bdb10dd6672ce2c

  • SHA256

    6b4d95cb045f393f4573e40405b2a39ae865d31de911b6bf35ae67071ce42995

  • SHA512

    798a877c9faa8dd240ed832d11778a18be43ca43a5f1ebd7a1fb448b55fc92a5981db6c03081b9ed3da1fa0f916cd2156aebdfc7efb5c86a74e1d19651475a82

  • SSDEEP

    384:icX+ni9VCr5nQI021q4VQBqURYp055TOtOOtEvwDpjqIGR/hHi7/OlI0G/7Ioqbn:XS5nQJ24LR1bytOOtEvwDpjNbP/Moqbn

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 3 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • Detects executables built or packed with MPress PE compressor 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-17_ff060947d6ae1a0d8cd5ac4ff00d9d77_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-17_ff060947d6ae1a0d8cd5ac4ff00d9d77_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:2916

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\misid.exe

          Filesize

          47KB

          MD5

          de7852dc15936b92eec40dab65b9f986

          SHA1

          b1fd329591f69b39a6dd6cb167c8c7aec0a789b3

          SHA256

          bb56d12c2062f1a47c1a98147281535d5aaa3bbf51d7091fff104babd1e5ad73

          SHA512

          60db25c7c701191138e58940d2b7fcc8a5f741a7b9c646529917f77ee3b6677dc8f367530a94d2011081908612dfe6a6fa1f9204733726cf653368db8edc53da

        • memory/1724-9-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/1724-8-0x0000000000500000-0x000000000050F000-memory.dmp

          Filesize

          60KB

        • memory/1724-1-0x0000000000380000-0x0000000000386000-memory.dmp

          Filesize

          24KB

        • memory/1724-0-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/1724-17-0x00000000028C0000-0x00000000028CF000-memory.dmp

          Filesize

          60KB

        • memory/1724-28-0x00000000028C0000-0x00000000028CF000-memory.dmp

          Filesize

          60KB

        • memory/2916-18-0x0000000000490000-0x0000000000496000-memory.dmp

          Filesize

          24KB

        • memory/2916-20-0x0000000000500000-0x000000000050F000-memory.dmp

          Filesize

          60KB