Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    28/04/2024, 11:27

General

  • Target

    2024-04-28_e580036ffb0dc859eff1d96a597c2d82_cryptolocker.exe

  • Size

    127KB

  • MD5

    e580036ffb0dc859eff1d96a597c2d82

  • SHA1

    0d21b508a0337cf0d7f8273fa222ef4fb905bde4

  • SHA256

    9d43e37bc95890448f1646bdce75ec8ac990c3900173946ba07968882ae139f3

  • SHA512

    d62e93842c6a28681f6bfd814bd2372bd3a61c41105ba3fbd5170318d50548649215a2266634cc67c7d6e47547becb5f09b6959b08bf63b7fb0801cc2b0d2222

  • SSDEEP

    1536:vj+jsMQMOtEvwDpj5HwYYTjipvF2hBfIuBKLUYOVbvh//LITr:vCjsIOtEvwDpj5H9YvQd2R+

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-28_e580036ffb0dc859eff1d96a597c2d82_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-28_e580036ffb0dc859eff1d96a597c2d82_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1688
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:2724

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\misid.exe

          Filesize

          127KB

          MD5

          1ccf8921d4c141c95deab399864ea84e

          SHA1

          77c9a76ae2fe8b0d1b5f7cac4c2dca3a41979c27

          SHA256

          c9bdec403c17e62513ea90931f40b5ae8322df0a18b82d4f98471ec135f4b2d4

          SHA512

          9437932272770abee474b8b5457b24289dd26aca71179750bfcd6cdffd951af9b471281f5159624db6056b0cd6b5cb1ba6935768c3e02ff79cc9da39172d23c8

        • memory/1688-0-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/1688-8-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/1688-1-0x0000000000300000-0x0000000000306000-memory.dmp

          Filesize

          24KB

        • memory/2724-15-0x0000000000480000-0x0000000000486000-memory.dmp

          Filesize

          24KB

        • memory/2724-22-0x0000000000440000-0x0000000000446000-memory.dmp

          Filesize

          24KB