Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    21/02/2024, 14:14

General

  • Target

    2024-02-21_e82ce59228350270b4701ef39d8a96ad_cryptolocker.exe

  • Size

    38KB

  • MD5

    e82ce59228350270b4701ef39d8a96ad

  • SHA1

    b85f77a26b3309e20413b8bce8f67ba36166a288

  • SHA256

    4c60e8c83960de93affb22ee3122487b384c1c30b37b315224f8f970ff235635

  • SHA512

    998e5b4836f7512ebe45784ecc50aa1d5bfaaba0f0fcb7028825dc0d9d666ae245ad5a50b2e0a738285189c3c307cd7c6cc105bb4f3c0424125465e9b9e5716a

  • SSDEEP

    768:UEEmoQDj/xnMp+yptndwe/PWQtOOtEvwDpjLen7n+j:ZzFbxmLPWQMOtEvwDpjLeU

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-21_e82ce59228350270b4701ef39d8a96ad_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-21_e82ce59228350270b4701ef39d8a96ad_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2132
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:2808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    38KB

    MD5

    d4d81c97f04d2e4c08bcc80ebf272358

    SHA1

    895cf08ca45977ea167f5d4491e2d399f16fad20

    SHA256

    6b8fa17acacee2564014387c644a966175dfb1ae39f1408d90fadcc6e00282a2

    SHA512

    96232758855f89773f55f7381228ae672a5b869d6357ab7fff9f6d21e835404da9f95be7d6da939c6dea9e1116702432e86cdc7e2c620687a91f0e70529609a2

  • memory/2132-0-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2132-1-0x0000000000270000-0x0000000000276000-memory.dmp

    Filesize

    24KB

  • memory/2132-3-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2808-16-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2808-15-0x0000000000200000-0x0000000000206000-memory.dmp

    Filesize

    24KB