Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    18/04/2024, 08:03

General

  • Target

    2024-04-18_cf6b9f04305831e2f6fc6fa7d06d33db_cryptolocker.exe

  • Size

    33KB

  • MD5

    cf6b9f04305831e2f6fc6fa7d06d33db

  • SHA1

    061d2a92ad43a39ba4e5ebfa2fd9addbd9edf7dd

  • SHA256

    f7d9fb9e7fea0be4fdb8c4e028ff0f1b92b9371ba15fa39c08ade5da64294885

  • SHA512

    f2b45e82e80c890f7ea84416f5a9ea3673a5230ac19bf4ed461b19c6da8b6d6c7a8d7bc9495856ca78897cda93d412a4fd81ca4b60d4a4a9a926fbb3f2a23709

  • SSDEEP

    768:bxNQIE0eBhkL2Fo1CCwgfjOg9Arbkzos5T:bxNrC7kYo1Fxf2rYf

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-18_cf6b9f04305831e2f6fc6fa7d06d33db_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-18_cf6b9f04305831e2f6fc6fa7d06d33db_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2740
    • C:\Users\Admin\AppData\Local\Temp\pissa.exe
      "C:\Users\Admin\AppData\Local\Temp\pissa.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:3048

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\pissa.exe

          Filesize

          33KB

          MD5

          64b1747748045c42dbb188d2bf9b9741

          SHA1

          323dcb7070f588e99e21e02b365c09295707fe21

          SHA256

          9c75f8d020f07113c249397e005693bf579ded58d61826942ba2941c546ce72e

          SHA512

          9a5e56e470a2caa0b245bd8e9d33434ac490e22a2f6d266f521af9ef75bc94a6ab950a6d6857394afb1b9bbe41e827f149155f4128e1c9c6642f4b9017191439

        • memory/2740-0-0x0000000000290000-0x0000000000296000-memory.dmp

          Filesize

          24KB

        • memory/2740-1-0x0000000000290000-0x0000000000296000-memory.dmp

          Filesize

          24KB

        • memory/2740-2-0x0000000000580000-0x0000000000586000-memory.dmp

          Filesize

          24KB

        • memory/3048-15-0x0000000000630000-0x0000000000636000-memory.dmp

          Filesize

          24KB

        • memory/3048-22-0x0000000000620000-0x0000000000626000-memory.dmp

          Filesize

          24KB