Analysis

  • max time kernel
    119s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    19/03/2024, 19:56

General

  • Target

    2024-03-19_ce12d12847e2e4429e59b590fdf51535_cryptolocker.exe

  • Size

    36KB

  • MD5

    ce12d12847e2e4429e59b590fdf51535

  • SHA1

    2d89edeed9fed719661acdf5bf7ceed1694716e3

  • SHA256

    fad781b757e44b0def0b93af0e5efbc5af44c485bfe35b6024d197f55485a39d

  • SHA512

    eabcc504d0100743156acad4c1b24fed9f6a1b793320ba6138ea3911cdead0f4ca613623414104dddb9bf134c579259530996e863d83d53a585de6bf472870d3

  • SSDEEP

    768:vQz7yVEhs9+js1SQtOOtEvwDpjz9+4/UkRYzMAAI:vj+jsMQMOtEvwDpj5HcSYPH

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-19_ce12d12847e2e4429e59b590fdf51535_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-19_ce12d12847e2e4429e59b590fdf51535_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2960
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:2624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0255CEC2C51D081EFF40366512890989_8139DA8AF71D2AC8E295A42D0C1D413B

    Filesize

    5B

    MD5

    5bfa51f3a417b98e7443eca90fc94703

    SHA1

    8c015d80b8a23f780bdd215dc842b0f5551f63bd

    SHA256

    bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

    SHA512

    4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\74FBF93595CFC8459196065CE54AD928

    Filesize

    1KB

    MD5

    ab9b109ce8934f11e7cd22ed550680da

    SHA1

    8d4c4a23ba9ee84ea7348fa98cc6e65fbb69de7b

    SHA256

    38392f17ce7b682c198d29c6e71d2740964a2074c8d2558e6cff64c27823f129

    SHA512

    678a8048e54a1323f8b5a8e735a1085a5bdd22bd2a3f5a975fd2824049725eb06405029901071356f42cdfd843712c05b418598fad700ad7a1edb1fa9b37af20

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9D8AA399C2860C8BCD48D536C7665154

    Filesize

    1KB

    MD5

    69b41325b38e45f520650d19ccb58cc8

    SHA1

    764d2fa59ed123f9c95570c403c92fef338ea745

    SHA256

    821cc55ce7ec5c74febb42f624eb6a36c478215a31ed67e3cf723a67e8c75eba

    SHA512

    52c1b885c6818f6abaf383f3c5da2159005c4ea90a13c8c55be4f098ce30f9fca5dbc3fd81292d89a68e15880cb546eb3b5e12bc165134dc0c43007b2b5791af

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0255CEC2C51D081EFF40366512890989_8139DA8AF71D2AC8E295A42D0C1D413B

    Filesize

    400B

    MD5

    050996f8da777023ef664588c6fd0c4d

    SHA1

    7f4dcbd46c7d988269136f9918f50c52ee76b8a9

    SHA256

    270d99d7320ae8fa2ef8d8d69c16284931b4957f7deb3b4850bd1afb147e337e

    SHA512

    9225bfa860ccc700ffa80022978de1c9de6b9819dcab7062f5bb3612fa48190abab1b267bca1ef30da4cef38fd915d646d4f87cb5e3250ab0d13c7cb666f7f28

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\74FBF93595CFC8459196065CE54AD928

    Filesize

    242B

    MD5

    81fbd36106e5d29821762bfd870c396d

    SHA1

    6310de047eaaaf4c78f19ae3c47c53808e0eda99

    SHA256

    c73d299e916f35560a317c1a34baaa449b924eb44869c22c72d7f7da78227bc8

    SHA512

    15fda4921bb17ea29167679010620e7478d2736a5af118d26ec1596fe2187ff4e7163930f306c7609c9e4b9f30cd99c453e05bb469c7afcc61b3581ee4c249a1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9D8AA399C2860C8BCD48D536C7665154

    Filesize

    266B

    MD5

    75a667878a7153f6c03710ddff5d853c

    SHA1

    c93124ae4d91c20bec5d22b3606c67b3b178f1b3

    SHA256

    c2a9f6d511301f1afce8f301e47bf996f83e65e37da084928375a657b91db87c

    SHA512

    16247618859fdb7b685837f3fc3fdb12f47a5acd9eedd919df1bc08c6b37371aed9919982e529360eb387e2685f97e424cc01f71968e3eca10cc1feadc188c50

  • C:\Users\Admin\AppData\Local\Temp\TarBB3B.tmp

    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

  • \Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    36KB

    MD5

    c5254e810fd777f5aa8e3c198a4bce28

    SHA1

    1edfcb2298fcbca18a5ef5091321890f31fdb0ce

    SHA256

    1037bb1031aecb16215a5cd6d3dd67d12c1b96bb792f731ace8eeeb7aa57ac59

    SHA512

    29b4afafb409476d9ad8c8915030a11a6f4602b1272452beee452121657c493f34a7b72cc44bb71e15e6ed5fa6f2de1f4f16e551e37b9f2cfa842c12583dfecf

  • memory/2624-18-0x00000000002B0000-0x00000000002B6000-memory.dmp

    Filesize

    24KB

  • memory/2624-15-0x00000000002F0000-0x00000000002F6000-memory.dmp

    Filesize

    24KB

  • memory/2960-0-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB

  • memory/2960-1-0x0000000000600000-0x0000000000606000-memory.dmp

    Filesize

    24KB

  • memory/2960-2-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB