Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07-05-2024 03:35

General

  • Target

    2024-05-07_671b72abee6d592d7414f2595a099be7_cryptolocker.exe

  • Size

    34KB

  • MD5

    671b72abee6d592d7414f2595a099be7

  • SHA1

    0bc321321d64c02c991ed9e10ff055213cfc8a13

  • SHA256

    463f62042c47224f4ca0176c4e47a904c335c21e2908969288f52a2ce9b3ac46

  • SHA512

    1fed03db6f7ff2178dfa4b32612ac903427999de9ad32b6ae595d1570297e9670253ada7fa76961baa57966defe84a6af0054efeea2ee39ef171acec3fdfad2b

  • SSDEEP

    768:bxNQIE0eBhkL2Fo1CCwgfjOg9Arbkzos5Md:bxNrC7kYo1Fxf2rYAd

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-07_671b72abee6d592d7414f2595a099be7_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-07_671b72abee6d592d7414f2595a099be7_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\Users\Admin\AppData\Local\Temp\pissa.exe
      "C:\Users\Admin\AppData\Local\Temp\pissa.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:2148

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\pissa.exe

    Filesize

    34KB

    MD5

    9a95a02ba7a0ba78b03ae346cd9ebbc3

    SHA1

    f7cf9fa6f9f0c118e2d3a89ff3c51bdb97eebd81

    SHA256

    9d53e413be287255ca3f7880258132610639b64a62c95df48f05770135b4fc75

    SHA512

    c86bd42a12f2d854152f304fadd6b18ca31327c22fee8af4ddabf1077383c0ff6d04be0e7df7f29b9454e45a8ea4cf92145e0a9c49aca62192b819608020c0e2

  • memory/2148-15-0x0000000001CB0000-0x0000000001CB6000-memory.dmp

    Filesize

    24KB

  • memory/2148-22-0x0000000001CA0000-0x0000000001CA6000-memory.dmp

    Filesize

    24KB

  • memory/2932-1-0x00000000002B0000-0x00000000002B6000-memory.dmp

    Filesize

    24KB

  • memory/2932-8-0x00000000002A0000-0x00000000002A6000-memory.dmp

    Filesize

    24KB

  • memory/2932-0-0x00000000002A0000-0x00000000002A6000-memory.dmp

    Filesize

    24KB