Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    12-05-2024 04:44

General

  • Target

    2024-05-12_896da32028899a4230c40c5c9659bf37_cryptolocker.exe

  • Size

    85KB

  • MD5

    896da32028899a4230c40c5c9659bf37

  • SHA1

    432a0f36b2f68ce48ca13141c5053345b7c67e42

  • SHA256

    ad1cdbd0745ce01ecad7296064126d39637628d0588b584ef2d8d35c1775bd25

  • SHA512

    52589a6fb75416c6eecbc4e38bcc0700fc704fc0f74c4ce258af8fae21303974e6658819422099995234b374f8964e4b8d28a5f349b4214ba06ad99886743e2c

  • SSDEEP

    1536:vj+jsMQMOtEvwDpj5HwYYTjipvF2hBfWafHNBHRx:vCjsIOtEvwDpj5H9YvQd2v

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-12_896da32028899a4230c40c5c9659bf37_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-12_896da32028899a4230c40c5c9659bf37_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:3044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    85KB

    MD5

    7a004643e2c34a2b9d981911db0908c3

    SHA1

    446aa5874c37e35d73d0b48daf31676b8100be09

    SHA256

    0452a32378b2094d6c5636c229bc8ecaabb9f8ac8a149abf4ef03ea153ca8cf3

    SHA512

    5fca017511d6e0d37b34c545703461047b6e30549669c15b8cad1c8e43f17ee4417a35d8adc7566d58d2f0af835d9948f9e1e8172a3409b4021d45b8acc316c9

  • memory/2240-0-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/2240-8-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/2240-1-0x0000000000600000-0x0000000000606000-memory.dmp

    Filesize

    24KB

  • memory/3044-15-0x00000000004C0000-0x00000000004C6000-memory.dmp

    Filesize

    24KB

  • memory/3044-22-0x00000000003C0000-0x00000000003C6000-memory.dmp

    Filesize

    24KB