Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    17-02-2024 13:28

General

  • Target

    2024-02-17_34da369ce4670180c61021a24768c820_cryptolocker.exe

  • Size

    78KB

  • MD5

    34da369ce4670180c61021a24768c820

  • SHA1

    914b9f50b803361b4b0187c5a0fa6713f4eecfa2

  • SHA256

    7e0264f4f0de5c9c427c630a7d465f388bfefe9d2bb40b250984a1424c76d719

  • SHA512

    cecacc01b020f923906d0171122c7e476d4d21b6a155bc53586dacf15f088880ff251cb66cfa237f6a559cb7333cb45e17e217a8250dec0d74c1f5bff0778e90

  • SSDEEP

    1536:vj+jsMQMOtEvwDpj5HwYYTjipvF2hBfWaO0O:vCjsIOtEvwDpj5H9YvQd2I

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-17_34da369ce4670180c61021a24768c820_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-17_34da369ce4670180c61021a24768c820_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1232
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:2732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    78KB

    MD5

    edac303b0df5f3e37d4473a0a5d68ebb

    SHA1

    b925946c73c0089e4afc1bdc0a9733cb90d6ab24

    SHA256

    882bd88a174aec41597a0149304ed1216dc1b6dd02f4ab27e512a356a8142736

    SHA512

    743fc4d75ea00060345905aa5e28aabeac0a60fe65540646b58ed3d413123e0a2ba3c6f31da8de3d59e4168a1368d065111b75e444cdc3554b758df0435eea07

  • memory/1232-0-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/1232-1-0x0000000000470000-0x0000000000476000-memory.dmp

    Filesize

    24KB

  • memory/1232-7-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2732-15-0x0000000000370000-0x0000000000376000-memory.dmp

    Filesize

    24KB

  • memory/2732-19-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB