Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22-02-2024 16:26

General

  • Target

    2024-02-22_132fec2cbb2b059eaea6a4596d692982_cryptolocker.exe

  • Size

    65KB

  • MD5

    132fec2cbb2b059eaea6a4596d692982

  • SHA1

    376b1e10e40e59c8ef589ab36548669bd141305c

  • SHA256

    7e71476dcb5c24db41775d49d6c534eb4924af30229c6c1adf934602ec63bbf8

  • SHA512

    f8b30a6200d25eaf96ecef733f6921f48232232642f97ca739e807532b38eec0cae3a468a62617607c47274877de814c2a9c6558fb5ebf55b39afb0da0fd511b

  • SSDEEP

    1536:ZzFbxmLPWQMOtEvwDpj386Sj/WprgJN6tZdOyJ3hvLcbVrF:ZVxkGOtEvwDpjcawL

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-22_132fec2cbb2b059eaea6a4596d692982_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-22_132fec2cbb2b059eaea6a4596d692982_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1940
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:2628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    66KB

    MD5

    8b1aeccb35d3e36f1a2f68d172915e89

    SHA1

    16c7e225b2044aaf59bd902403e10d00b1dfa708

    SHA256

    072d80e8673181b2d0c33166df9570c98fb15d7937be0dd6c37611df526c984a

    SHA512

    b50deb412cb7ae34d63c9dcd9de1ca0ae561b93cc7c4cbce1aa9045869b866b71e3837334fc99817921d025fcf3875da77f8d4cfe1aa740c0c96baebf9bd05c5

  • memory/1940-1-0x0000000000230000-0x0000000000236000-memory.dmp

    Filesize

    24KB

  • memory/1940-0-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/1940-2-0x0000000000370000-0x0000000000376000-memory.dmp

    Filesize

    24KB

  • memory/1940-9-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2628-17-0x0000000000460000-0x0000000000466000-memory.dmp

    Filesize

    24KB

  • memory/2628-15-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2628-20-0x0000000000320000-0x0000000000326000-memory.dmp

    Filesize

    24KB

  • memory/2628-25-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB