Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29/03/2024, 04:05

General

  • Target

    2024-03-29_d00b77ffcac2dccc2e2e27ce0d28ac38_cryptolocker.exe

  • Size

    81KB

  • MD5

    d00b77ffcac2dccc2e2e27ce0d28ac38

  • SHA1

    05308ca88fb6f980570bd0c9ff569ceae6b6eee4

  • SHA256

    ba56efb9da1477551c0eb699298da61c7d14d011036490603487453b68c5c47a

  • SHA512

    4b28d489c2eaec57daaebbecaa15a4c9d240ecb109dba6c4758b168fe102bae2ddd3264f0feb52ba7413e7ae0f225d4c6135b79f504f0390eaa7760b2c05a661

  • SSDEEP

    1536:Tj+jsMQMOtEvwDpj5HmpJpOUHECgNMo0vp2EMMAe:TCjsIOtEvwDpj5HE/OUHnSMB

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Detection of Cryptolocker Samples 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-29_d00b77ffcac2dccc2e2e27ce0d28ac38_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-29_d00b77ffcac2dccc2e2e27ce0d28ac38_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2928
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:2852

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\misid.exe

          Filesize

          81KB

          MD5

          11b9f0cf01e32a4510179ce95beebcba

          SHA1

          d1d0e1ea2d72cc73a2d917c3d48ea39e1e257f4b

          SHA256

          028e0a9386c5643e5b9c09ea246f8edc2116efd7f7656094cad679d6c779442f

          SHA512

          42a0c374531dd2f154d1e8522059f7c2249953d5e834a67f73390903de8a75b2e558918c101c60dbb2df4a579dec83b837254b4f708063ab7af16a2b4c128abb

        • memory/2852-16-0x0000000000500000-0x000000000050E000-memory.dmp

          Filesize

          56KB

        • memory/2852-18-0x00000000004A0000-0x00000000004A6000-memory.dmp

          Filesize

          24KB

        • memory/2852-25-0x0000000000500000-0x000000000050E000-memory.dmp

          Filesize

          56KB

        • memory/2928-0-0x0000000000500000-0x000000000050E000-memory.dmp

          Filesize

          56KB

        • memory/2928-1-0x0000000000420000-0x0000000000426000-memory.dmp

          Filesize

          24KB

        • memory/2928-2-0x0000000000460000-0x0000000000466000-memory.dmp

          Filesize

          24KB

        • memory/2928-9-0x0000000000420000-0x0000000000426000-memory.dmp

          Filesize

          24KB

        • memory/2928-15-0x0000000000500000-0x000000000050E000-memory.dmp

          Filesize

          56KB