Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23-02-2024 21:24

General

  • Target

    2024-02-23_3827ef0aae55f611d87d0730a7bd4ae2_cryptolocker.exe

  • Size

    42KB

  • MD5

    3827ef0aae55f611d87d0730a7bd4ae2

  • SHA1

    7723b55e7ecbe40adfaa57f493671139e49a44c7

  • SHA256

    29bef0f418e8db09f46ea4ea98c9ca420bc3617942e3a64b18dacac0803e3126

  • SHA512

    988477080adae4ea78737023a8286563b3ba385df5f19377d4299b590fcaff44610d59eb478588a90cfce4c285ec8f7dbed87b1b6f4c5fe3521e0112e659ef12

  • SSDEEP

    768:UEEmoQDj/xnMp+yptndwe/PWQtOOtEvwDpjLenQL3bTNb:ZzFbxmLPWQMOtEvwDpjLeU3R

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-23_3827ef0aae55f611d87d0730a7bd4ae2_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-23_3827ef0aae55f611d87d0730a7bd4ae2_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2168
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:2532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    42KB

    MD5

    d05d6436a4a0cefebaa6abe7d455d504

    SHA1

    0ea637beea1f957b161942fddd140ef7fad3b226

    SHA256

    e5edadeeb4f556c4f03c90c1d2323a120a23e53734ec9745aebd15568c33a2f4

    SHA512

    d25d88663e172ebfe456d28467c3763c1b1ca7f5fd3ed2146e04425737b631ce282eb4cab127e3f58e292047251df39a6e2849c7ef3d0774b290152707b9ad14

  • memory/2168-1-0x00000000001C0000-0x00000000001C6000-memory.dmp

    Filesize

    24KB

  • memory/2168-0-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2168-2-0x0000000000290000-0x0000000000296000-memory.dmp

    Filesize

    24KB

  • memory/2168-3-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2532-16-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/2532-18-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2532-24-0x0000000000230000-0x0000000000236000-memory.dmp

    Filesize

    24KB