Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240319-en
  • resource tags

    arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system
  • submitted
    03-04-2024 06:43

General

  • Target

    2024-04-03_8977a92816cbe7f7d8210c29e100bffc_cryptolocker.exe

  • Size

    44KB

  • MD5

    8977a92816cbe7f7d8210c29e100bffc

  • SHA1

    838cf97276fc5a42928fe73178920cf8ea714eeb

  • SHA256

    cfc522c86dc5c88f79f8309e39526eba68c561c337f7cc9ac7cdfcd9e3133943

  • SHA512

    5205a2f183ae84415035ec4430dd768731ada24acdb9c624f5eec2960186ecabe300b00405909ee804969dff8089b414de5fafc65913df3632ba55a9ffbe8e8c

  • SSDEEP

    768:bxNQIE0eBhkL2Fo1CCwgfjOg1tsJ6zeen754XcwxbFqRoN6e:bxNrC7kYo1Fxf3s05rwxbFvN6e

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-03_8977a92816cbe7f7d8210c29e100bffc_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-03_8977a92816cbe7f7d8210c29e100bffc_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1980
    • C:\Users\Admin\AppData\Local\Temp\pissa.exe
      "C:\Users\Admin\AppData\Local\Temp\pissa.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:1992

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\pissa.exe
    Filesize

    44KB

    MD5

    7ab94442c197f7be2eec50de53d97f7d

    SHA1

    157cf071b2cbb8d1b03663475241bcb5ccd6d36d

    SHA256

    a50d69441caa8916307ad803606190905df7ced64b95e3c41b9f621143a86e80

    SHA512

    6dc8140cfe04779f890d3ee35885c100ea6e942acd0a40a4158351167f512bfffc0e18543b1a1f699e9b29131909601145b46def958b12e566a63ad3f6d73ba0

  • memory/1980-0-0x00000000003F0000-0x00000000003F6000-memory.dmp
    Filesize

    24KB

  • memory/1980-1-0x0000000001CE0000-0x0000000001CE6000-memory.dmp
    Filesize

    24KB

  • memory/1980-2-0x00000000003F0000-0x00000000003F6000-memory.dmp
    Filesize

    24KB

  • memory/1992-15-0x0000000000590000-0x0000000000596000-memory.dmp
    Filesize

    24KB

  • memory/1992-18-0x0000000000360000-0x0000000000366000-memory.dmp
    Filesize

    24KB