Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240319-en
  • resource tags

    arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2024, 15:25

General

  • Target

    2024-03-28_3aa1981c8647e9525eb027143193831d_cryptolocker.exe

  • Size

    87KB

  • MD5

    3aa1981c8647e9525eb027143193831d

  • SHA1

    1e15bed50a73861eb625f6a3bc0581cc88f08943

  • SHA256

    0a7e6a79ee1e743f7652c541b44d823c4d432142e223666676d75c33de21e1c4

  • SHA512

    1a8aa9db0fdf3231c5c7ebe90f951793501e845af2d09d3efbe179c44d253acbea543a4be42cc4506ba578f53bd42e0ee172eb13b89ee8996ce2a1f82887e96a

  • SSDEEP

    1536:i5nkFGMOtEvwDpjNbwQEI8UtzNcO8AcVL:okFDOtEvwDpjPq

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 6 IoCs
  • Detection of Cryptolocker Samples 3 IoCs
  • Detects executables built or packed with MPress PE compressor 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-28_3aa1981c8647e9525eb027143193831d_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3aa1981c8647e9525eb027143193831d_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1900
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:2368

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar4C24.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • \Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    88KB

    MD5

    e8a09c3e864cff85e6895a1a72b37028

    SHA1

    bff1265ebc786fbfaed7aaa9ce24d0137c1df4b3

    SHA256

    0995141b3f897eaecd9283797ad966fb8d2867d20db10940b93c2182cb0bfd1f

    SHA512

    675640d44e455d3a2ae7d0a7f50bb335cf458ef0d39efc2302d37b435fecadd2b36abfbb264a8b8c3c6796dfdec79cd1af8a27c40f40c5a70f3403f7e7c5d7e6

  • memory/1900-1-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/1900-2-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB

  • memory/1900-8-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/1900-15-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/1900-0-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/1900-13-0x0000000002800000-0x000000000280F000-memory.dmp

    Filesize

    60KB

  • memory/2368-17-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/2368-21-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2368-19-0x0000000000270000-0x0000000000276000-memory.dmp

    Filesize

    24KB

  • memory/2368-96-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB