Analysis

  • max time kernel
    132s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27/03/2024, 04:07

General

  • Target

    2024-03-27_ba465a035b0f85e336873c4f777c4b5e_cryptolocker.exe

  • Size

    50KB

  • MD5

    ba465a035b0f85e336873c4f777c4b5e

  • SHA1

    8d4a99dcbd877272e0788647f655f57b46c35606

  • SHA256

    c7c230d3dd29da71f85c539b3348a3f136f25dac6abf2551187283edccf21e15

  • SHA512

    789c5adce67c11268f4400717e83dfcaf504c5a7e63e2ffc0b8927292cdc53798a3ae35edaaf74ca6e72691e4a67c9b215d5439b9a92009989838d6cdd3342b0

  • SSDEEP

    768:vQz7yVEhs9+js1SQtOOtEvwDpjz9+4/Uth8igNrr42A7n0Fmy7gKt/:vj+jsMQMOtEvwDpj5HczerLO04y7t

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-27_ba465a035b0f85e336873c4f777c4b5e_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-27_ba465a035b0f85e336873c4f777c4b5e_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:2512

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\misid.exe

          Filesize

          50KB

          MD5

          e6d6243d4386847ec886c9c48968e656

          SHA1

          13e1da5efd83db1ab7384ee597cf45c9b321ca49

          SHA256

          08540c8bc86b6b47275a22148e2e9ae06d1a67073559c7b78a1a185ff32c8177

          SHA512

          cec49b1dd0d3d8824cc03b2c3e7360ca6d6759ed3bc73980605e21d12258b8f44d0155b2e56a1eebef540e9bb05a19da7cb826c4b738c21e6ce4b93055be4823

        • memory/2188-0-0x0000000000250000-0x0000000000256000-memory.dmp

          Filesize

          24KB

        • memory/2188-1-0x0000000000470000-0x0000000000476000-memory.dmp

          Filesize

          24KB

        • memory/2188-3-0x0000000000250000-0x0000000000256000-memory.dmp

          Filesize

          24KB

        • memory/2512-16-0x00000000003A0000-0x00000000003A6000-memory.dmp

          Filesize

          24KB

        • memory/2512-15-0x0000000000450000-0x0000000000456000-memory.dmp

          Filesize

          24KB