Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    08/03/2024, 10:42

General

  • Target

    2024-03-08_62f1b9ee71626af87d1b74eb7395a59c_cryptolocker.exe

  • Size

    77KB

  • MD5

    62f1b9ee71626af87d1b74eb7395a59c

  • SHA1

    04b350a53bf3c08b75231d858f0ecd73c43b343b

  • SHA256

    fc583575905287d149da53ccabb5b86ac44752e7a85d3bb97aff136f78944d87

  • SHA512

    dc1038e3b1e9de22b1e9f51a37bb012a55876c9db3734a7c9b8bb1cc234df195bce6d686f7cba0ff7b2229489aa99f52e342f68d1de971af06718dbfb3fa7610

  • SSDEEP

    1536:vj+jsMQMOtEvwDpj5HwYYTjipvF2hBfIuf8:vCjsIOtEvwDpj5H9YvQd2Y

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-08_62f1b9ee71626af87d1b74eb7395a59c_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-08_62f1b9ee71626af87d1b74eb7395a59c_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2768
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:2712

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\misid.exe

          Filesize

          77KB

          MD5

          9e8795ff4d6e0734dc3540efa6b3e7d0

          SHA1

          a3e5a449d27e8f3533c471a7d6850edc532a7e09

          SHA256

          fd80e2435ee554526abc54200dbf6f41b2d48cdeea6c69d3d3057304de7870fa

          SHA512

          a7ebdba1a0babb7ae99a014cb989cdfc9a398dfeb7d4ca12f01d01700abbca45da68da53b7b95cd593a24337262a216d9cac5e354b2c99693ead9cbf36c5cb03

        • memory/2712-15-0x0000000000470000-0x0000000000476000-memory.dmp

          Filesize

          24KB

        • memory/2712-16-0x00000000002D0000-0x00000000002D6000-memory.dmp

          Filesize

          24KB

        • memory/2768-0-0x00000000004E0000-0x00000000004E6000-memory.dmp

          Filesize

          24KB

        • memory/2768-1-0x0000000000530000-0x0000000000536000-memory.dmp

          Filesize

          24KB

        • memory/2768-8-0x00000000004E0000-0x00000000004E6000-memory.dmp

          Filesize

          24KB