Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    30/04/2024, 13:39

General

  • Target

    2024-04-30_934b98441cfa7e024d1743715046d550_cryptolocker.exe

  • Size

    33KB

  • MD5

    934b98441cfa7e024d1743715046d550

  • SHA1

    5c8d18e7d450d5f70c353ff1d51ef179d4816da4

  • SHA256

    8468b9fce2a39bdafdff263fcd16a889c2803da97c6f7fb9c1d74667c17ae7a5

  • SHA512

    11783869eefa4fb465d77ef719780d8be71eef6cfcb3d2a274e6bd846d0f2482ab5ae3323e4a083b1067167d00bc47fcd5f82f4c1cd37603e5de57c8276e367c

  • SSDEEP

    768:bxNQIE0eBhkL2Fo1CCwgfjOg9Arbkzos5N:bxNrC7kYo1Fxf2rYh

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-30_934b98441cfa7e024d1743715046d550_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-30_934b98441cfa7e024d1743715046d550_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1624
    • C:\Users\Admin\AppData\Local\Temp\pissa.exe
      "C:\Users\Admin\AppData\Local\Temp\pissa.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:3012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\pissa.exe

    Filesize

    34KB

    MD5

    8082e8fc6e3fb1cd8e1b6780d8840194

    SHA1

    03a254bde5f3014f3cc328d568efb4b0276f2109

    SHA256

    6c546b70fff510c8148a3a8da38adfdf37f43d1444dde2639b37be0b451fe73f

    SHA512

    fd981f887a4613b87f48b043b930c07090c4c56a7dcea94741945cd510cf292d918777e150377a9ce1b18df46e4881cb3e4372b34d996b285d435515e917e797

  • memory/1624-0-0x0000000000320000-0x0000000000326000-memory.dmp

    Filesize

    24KB

  • memory/1624-1-0x0000000000330000-0x0000000000336000-memory.dmp

    Filesize

    24KB

  • memory/1624-8-0x0000000000320000-0x0000000000326000-memory.dmp

    Filesize

    24KB

  • memory/3012-15-0x0000000000460000-0x0000000000466000-memory.dmp

    Filesize

    24KB

  • memory/3012-22-0x0000000000450000-0x0000000000456000-memory.dmp

    Filesize

    24KB