Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    02-05-2024 03:36

General

  • Target

    2024-05-02_70837dbacfa2477c60d7ac43672c36f3_cryptolocker.exe

  • Size

    56KB

  • MD5

    70837dbacfa2477c60d7ac43672c36f3

  • SHA1

    cee9e20bf6dc4cd52dfab5df05457d12b30c50a1

  • SHA256

    34cd2f40934c8a71ed1c1e2f33c30f1f5a5b15558492776a76aaf2479158c8ed

  • SHA512

    40fc5a942e25cf5999b69b70a114711204c4f75c0b3e1e6fbb663d93ab0912f34857cad0edd74a67ac892248b171ff982a1ff02dcfceb074eac281910db4f99b

  • SSDEEP

    768:vQz7yVEhs9+js1SQtOOtEvwDpjz9+4hdCW1nw71TkhsiPn1YFv6dl4NNTT:vj+jsMQMOtEvwDpj5HH1nw73KOFiA1

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-02_70837dbacfa2477c60d7ac43672c36f3_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-02_70837dbacfa2477c60d7ac43672c36f3_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2416
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:2216

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    57KB

    MD5

    423ca0d41a5b19aed5e845eb55678099

    SHA1

    0ccf17af8af05c661b569b36fa9b88dc54b776de

    SHA256

    6961f6f57d00c26f49af3d4fb33195b16e552f560cd6df846e31ad1a46882ba5

    SHA512

    d5b61813d27f3a9fed68a467c426c42809feb2227aa76d6d51b135d6c22e49899914501be0de88f3223d30200e6dbce861d51bc84e76607109335666f0031235

  • memory/2216-15-0x0000000000470000-0x0000000000476000-memory.dmp

    Filesize

    24KB

  • memory/2216-22-0x0000000000330000-0x0000000000336000-memory.dmp

    Filesize

    24KB

  • memory/2416-1-0x0000000000310000-0x0000000000316000-memory.dmp

    Filesize

    24KB

  • memory/2416-0-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/2416-8-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB