Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    12/05/2024, 04:07

General

  • Target

    2024-05-12_7d525ab4adfc8f97dfeb5395af3891d6_cryptolocker.exe

  • Size

    85KB

  • MD5

    7d525ab4adfc8f97dfeb5395af3891d6

  • SHA1

    77080897750ff86e1a01af88b6ee16d156453121

  • SHA256

    e60551b66342c8dd8a3a0330c4c46a4a335f9ae88644f08595cd19dbf9c37c51

  • SHA512

    7f5f5cca1619d1bdea9907821b02f35c2e62787038f60d4c6c8103dcda9e76431b600457b2bbc7c08ee125172085475ca4a2bb9b80d5b222882bfbdfef20c0e4

  • SSDEEP

    1536:vj+jsMQMOtEvwDpj5HwYYTjipvF2hBfWafHNBHRv:vCjsIOtEvwDpj5H9YvQd2R

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-12_7d525ab4adfc8f97dfeb5395af3891d6_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-12_7d525ab4adfc8f97dfeb5395af3891d6_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2936
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:2984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    85KB

    MD5

    ae879a90b53e79a65ad2fadf7d2a0ba3

    SHA1

    ae7db7caf10fcca88934ee83d9725bb2a95f189c

    SHA256

    f8f889c68ba5023dbae8107dcedc67ade5c0a2ea0234e5906fd4282ad607c371

    SHA512

    f94846b8ca7d178b29704f5ae350aab9b92810b819f13548e0c91cc29f1c77b5bf6508af1cfe9d38a98161a801f3ae1003ee3752e3201a89714abd32557aeca0

  • memory/2936-0-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/2936-1-0x0000000000310000-0x0000000000316000-memory.dmp

    Filesize

    24KB

  • memory/2936-8-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/2984-15-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB

  • memory/2984-22-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB