Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    22-02-2024 09:08

General

  • Target

    2024-02-22_b75ee538df2b93b7cab65d35a9ee96ad_cryptolocker.exe

  • Size

    124KB

  • MD5

    b75ee538df2b93b7cab65d35a9ee96ad

  • SHA1

    cbf5e7c68e38264276cde8cc00dddb0e8f2850eb

  • SHA256

    a808130e47f33eda49eb74fa439de9f70249a9d2f1acca70cd75c2766c8e2f0e

  • SHA512

    7e96ebc6f6fc7b124bdef1e9cae9d3d9ddf49ba665a95eb89cca781fc1fccef4c443de10624d98344eff812404ec8236f8f332eb46163581f939f718b4e73ae3

  • SSDEEP

    1536:gUj+AIMOtEvwDpjNbwQEIPlemUhYwkkxE4V:vCA9OtEvwDpjQ

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-22_b75ee538df2b93b7cab65d35a9ee96ad_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-22_b75ee538df2b93b7cab65d35a9ee96ad_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1288
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:2624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    124KB

    MD5

    669674107ab88b28a966f9c751e6073c

    SHA1

    4051513925159de71c3e457d4f6067815466fefc

    SHA256

    1de8eb4385b18bbc94a3b6b3f76dd10bec723448bb5d913ad6139f3f44228022

    SHA512

    587b4427c86ca5467bf9bc16b21c01861bdcec5e6a0458eff8af99ec2bf7a00c49bb55df310e668751bb929ff49cc837dd2f5b34d1636aebd3eb3415030f411d

  • memory/1288-0-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/1288-1-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/1288-8-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2624-15-0x00000000020B0000-0x00000000020B6000-memory.dmp

    Filesize

    24KB

  • memory/2624-17-0x0000000000600000-0x0000000000606000-memory.dmp

    Filesize

    24KB