Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    15/03/2024, 10:12

General

  • Target

    2024-03-15_eebee3f74ac506fa673c8e064c500ef3_cryptolocker.exe

  • Size

    40KB

  • MD5

    eebee3f74ac506fa673c8e064c500ef3

  • SHA1

    64de5ab7364a7e18dddcd8c36dec3f4274df3021

  • SHA256

    387f26278ff0113f6bdeb3f036faebef3ed4bf6199ee12d78a1312c72cac4f90

  • SHA512

    081f79d8a6f2ab5a48d16409e9ce62214f5c2690458dbf9419ae29f19920041d9577527f71009b529f797aa14b001896e5c500a7309b7ec8f32f09c23f6c29d5

  • SSDEEP

    768:vQz7yVEhs9+js1SQtOOtEvwDpjz9+4tKM3Az5mRD:vj+jsMQMOtEvwDpj5Ht13A4RD

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-15_eebee3f74ac506fa673c8e064c500ef3_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-15_eebee3f74ac506fa673c8e064c500ef3_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2896
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:2004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    40KB

    MD5

    a1545069165e8c34443407dfb27625f6

    SHA1

    4e122527a9065054ef85c5ed1b3efd0d5a8ca19b

    SHA256

    050b7b72f6a3a7eb659d86cf13b47f994b8a4a3b1f5e32d2e01a7f75f7e2c95f

    SHA512

    a3bb41d0cf3195a99cdae7ed3f025949114cd8a628b099db32fc45df0b41c8d5b69a65ca651f006b2f717aec21324e98647e2f3b41b3fe9180822ab43eb91c11

  • memory/2004-15-0x0000000000380000-0x0000000000386000-memory.dmp

    Filesize

    24KB

  • memory/2004-19-0x0000000000340000-0x0000000000346000-memory.dmp

    Filesize

    24KB

  • memory/2896-0-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/2896-2-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/2896-1-0x0000000000300000-0x0000000000306000-memory.dmp

    Filesize

    24KB