Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    18/04/2024, 07:33

General

  • Target

    2024-04-18_45cdd865b81c45dfa4f2b7ea93f7d3f4_cryptolocker.exe

  • Size

    82KB

  • MD5

    45cdd865b81c45dfa4f2b7ea93f7d3f4

  • SHA1

    5546f89992276fc06d39119a19e59177b793aa2f

  • SHA256

    3e99e1f8e748c5e56b0d94da83bf7c1a8f43bf386da680e9f16ea0125dcb8f2a

  • SHA512

    48158a9314440830b399aec1d26b58ec2b5cf9eb9a269ed1fbb4fb3ba68343b46c90be39be7adbc047356efd6c58057a53e811e87fe312d0474d13454153f127

  • SSDEEP

    1536:Tj+jsMQMOtEvwDpj5HmpJpOUHECgNMo0vp2EMMrMC:TCjsIOtEvwDpj5HE/OUHnSMv

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Detection of Cryptolocker Samples 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-18_45cdd865b81c45dfa4f2b7ea93f7d3f4_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-18_45cdd865b81c45dfa4f2b7ea93f7d3f4_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2844
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:2536

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\misid.exe

          Filesize

          82KB

          MD5

          24ac90aba9d045ac12b1f22c6425a4ff

          SHA1

          c7c530407f77761bd9d1fb508b0b546880a84a0e

          SHA256

          c2271e31347e26bfba6d5e20de2e60140c073e1d3bbfe5dc892d86e35fd51727

          SHA512

          f5614e565166082fefb6311d2f980834cdab0aea2a4a5e36d5d90bc35070ea6860c4108a8f0e629f8eacfc9134a728c83444030cba8c5e37d42bb7e7b27f49e5

        • memory/2536-16-0x0000000000500000-0x000000000050E000-memory.dmp

          Filesize

          56KB

        • memory/2536-18-0x0000000000270000-0x0000000000276000-memory.dmp

          Filesize

          24KB

        • memory/2536-20-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/2536-26-0x0000000000500000-0x000000000050E000-memory.dmp

          Filesize

          56KB

        • memory/2844-0-0x0000000000500000-0x000000000050E000-memory.dmp

          Filesize

          56KB

        • memory/2844-1-0x00000000001D0000-0x00000000001D6000-memory.dmp

          Filesize

          24KB

        • memory/2844-2-0x0000000000210000-0x0000000000216000-memory.dmp

          Filesize

          24KB

        • memory/2844-6-0x00000000001D0000-0x00000000001D6000-memory.dmp

          Filesize

          24KB

        • memory/2844-14-0x0000000000500000-0x000000000050E000-memory.dmp

          Filesize

          56KB