Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    21/04/2024, 19:48

General

  • Target

    2024-04-21_f31c59745594187e46db9c6d7e004bdf_cryptolocker.exe

  • Size

    82KB

  • MD5

    f31c59745594187e46db9c6d7e004bdf

  • SHA1

    803cb75d8778b4076d8bf520c71e877f0a195e1a

  • SHA256

    cbab7aee9a53f4b69cbe3ec2e2aa9fdc39faea7e13850a783f934df53cc9489f

  • SHA512

    d375ea7358f0750ab1bfe5885cc80c1de9c46be6b62d4d9117ccdc5c5465bfd07854c766b9ed4583f072003096c4ba09181910f2dbc91228a5274da61a79d0e1

  • SSDEEP

    1536:Tj+jsMQMOtEvwDpj5HmpJpOUHECgNMo0vp2EMMrht:TCjsIOtEvwDpj5HE/OUHnSMB

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Detection of Cryptolocker Samples 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-21_f31c59745594187e46db9c6d7e004bdf_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-21_f31c59745594187e46db9c6d7e004bdf_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:2172

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\misid.exe

          Filesize

          82KB

          MD5

          934f05bbfee06f60f551ad40f49922ba

          SHA1

          70948a69cc965aacaab1fd1d2e51e83b4b0a973e

          SHA256

          6574c86f3508c68bdeab9fbf121504b8e67f44f89a1f8a9b2632a71ce2c819c0

          SHA512

          af5c16860d1519474f567a3c594ff808c90b19963f7b11bd199017b2e7dd8998589f17ce3cca19f93fd718e6dcec00d7880552bd53049a99f0f001be68c19ced

        • memory/2172-16-0x0000000000500000-0x000000000050E000-memory.dmp

          Filesize

          56KB

        • memory/2172-18-0x0000000000280000-0x0000000000286000-memory.dmp

          Filesize

          24KB

        • memory/2172-20-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/2172-26-0x0000000000500000-0x000000000050E000-memory.dmp

          Filesize

          56KB

        • memory/2196-0-0x0000000000500000-0x000000000050E000-memory.dmp

          Filesize

          56KB

        • memory/2196-1-0x0000000000330000-0x0000000000336000-memory.dmp

          Filesize

          24KB

        • memory/2196-2-0x0000000000370000-0x0000000000376000-memory.dmp

          Filesize

          24KB

        • memory/2196-4-0x0000000000330000-0x0000000000336000-memory.dmp

          Filesize

          24KB

        • memory/2196-15-0x0000000000500000-0x000000000050E000-memory.dmp

          Filesize

          56KB