Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    17-02-2024 17:50

General

  • Target

    2024-02-17_fd90ecc83d2e3fa2dfa3e1908a38818a_cryptolocker.exe

  • Size

    40KB

  • MD5

    fd90ecc83d2e3fa2dfa3e1908a38818a

  • SHA1

    090ac557d38bca5034b2e5d4c21e300534a2c776

  • SHA256

    3e7e651b19f5fe5db0d25d5f02008f20cac3cff34b889ed58bc2ee749e6741db

  • SHA512

    684da2a67ba9ac6213c5787bfb1e1cce0eac04edbdf3074aac75bc01a20b1f7deec42a41509d1b44269eba72e6db595485b6ca058c4ee24ae3a4b1377d021f21

  • SSDEEP

    768:UEEmoQDj/xnMp+yptndwe/PWQtOOtEvwDpjLenQL3bTX:ZzFbxmLPWQMOtEvwDpjLeU3P

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-17_fd90ecc83d2e3fa2dfa3e1908a38818a_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-17_fd90ecc83d2e3fa2dfa3e1908a38818a_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:2300

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    41KB

    MD5

    48c4fa669084bea6a9d52acf18f5d3cb

    SHA1

    465487b5170c9d433a5f8e0f3cb3155edb33bf56

    SHA256

    b9a15b042e1de11fc73caab761ef02f74559f5fb9bd4e59704f15aad82f5995d

    SHA512

    750e046146dfbc0a66ed333e549c641e7fe40b4da87acf3da1dbd42fbcc3630e8851f8f1bc8ad636f9813a7332e9aa3b4082e39df682d3b35c99a6a4059aae08

  • memory/2148-0-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2148-2-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2148-1-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB

  • memory/2300-15-0x0000000000480000-0x0000000000486000-memory.dmp

    Filesize

    24KB