Analysis

  • max time kernel
    149s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    20-02-2024 12:31

General

  • Target

    2024-02-20_53bf6a31f07f5a61235930c905e2822b_cryptolocker.exe

  • Size

    38KB

  • MD5

    53bf6a31f07f5a61235930c905e2822b

  • SHA1

    843916d77732ab63ae633741816847f0a61ec351

  • SHA256

    6822ab0deb2c633ceca291266acfe0468e2d3dccd50a20b2502de7fe49e6a441

  • SHA512

    50acd75c440cc85f2a4827bc61df2a340d1c1156991c5b2686326c27d6321d04be1448e2c5b2b7aa6eacebd6c053a711bb38208ebf82102488754ccd1a5fa415

  • SSDEEP

    768:UEEmoQDj/xnMp+yptndwe/PWQtOOtEvwDpjLen7n+i:ZzFbxmLPWQMOtEvwDpjLeB

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-20_53bf6a31f07f5a61235930c905e2822b_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-20_53bf6a31f07f5a61235930c905e2822b_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1272
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:2920

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    38KB

    MD5

    940eee16babf798cb497f628588e2403

    SHA1

    2aa57b9775876c3f0ad730df3c6bcd17bb580317

    SHA256

    7b18b73cbb2ba5e7376a7df7e49d66edb56b938661f3c16945a1b3a872dc2be3

    SHA512

    203bc8d8af36fc88924ab6c6a80c5610ace106045adf62910e42841a74173be42eacdfd078667812f22b93eeae6e1e63ce3b345fe31e2ba13160610e785f1c7b

  • memory/1272-0-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/1272-1-0x0000000000380000-0x0000000000386000-memory.dmp

    Filesize

    24KB

  • memory/1272-3-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2920-15-0x00000000003F0000-0x00000000003F6000-memory.dmp

    Filesize

    24KB

  • memory/2920-17-0x00000000003B0000-0x00000000003B6000-memory.dmp

    Filesize

    24KB