Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    26/03/2024, 14:35

General

  • Target

    2024-03-26_edf744754e09be6096f7df5b56486022_cryptolocker.exe

  • Size

    77KB

  • MD5

    edf744754e09be6096f7df5b56486022

  • SHA1

    9efdfe4e17b8472a4b7b177bf0901dd99f52f7a3

  • SHA256

    8b831ab71d2d950e465e5943ae8ed4390dbce866e2344b70e373d98e78b59cbd

  • SHA512

    5652772657976bcddc78dd818edde28bf7221a098c8d5d3d4199ef83e9042f93a145fa2311dd77014c9de0101ffcbe42fb875bd5297dab8e8a8ba5a089cbddc5

  • SSDEEP

    1536:vj+jsMQMOtEvwDpj5HwYYTjipvF2hBfIuf6:vCjsIOtEvwDpj5H9YvQd2G

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-26_edf744754e09be6096f7df5b56486022_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-26_edf744754e09be6096f7df5b56486022_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2808
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:2596

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\misid.exe

          Filesize

          77KB

          MD5

          29de16f4f4994166c0481b6fe6ca9098

          SHA1

          170bbbbb297e08f3b82e8aebae17f29807987d6f

          SHA256

          26878aac427cd8cd7374ca462dc179fe9e3cf264964b49da6190a73df7373750

          SHA512

          2cd413fc022e368d252ed9adf1036cbe6da2e37a238596a6f36fe83e3ee9d67d1dfd7e48b257853981c0138089a2435ed3f557be0bc0477f73d6d9c700fe8ca3

        • memory/2596-16-0x0000000000280000-0x0000000000286000-memory.dmp

          Filesize

          24KB

        • memory/2596-15-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/2808-0-0x00000000001E0000-0x00000000001E6000-memory.dmp

          Filesize

          24KB

        • memory/2808-2-0x00000000002A0000-0x00000000002A6000-memory.dmp

          Filesize

          24KB

        • memory/2808-1-0x00000000001E0000-0x00000000001E6000-memory.dmp

          Filesize

          24KB