Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    16-05-2024 16:44

General

  • Target

    2024-05-16_02c36a9f4a91fb86c0793473c2ddd5d5_cryptolocker.exe

  • Size

    57KB

  • MD5

    02c36a9f4a91fb86c0793473c2ddd5d5

  • SHA1

    50fb76d2f3bfb7fa540c7a848a918d57b4ca9f48

  • SHA256

    e5df5083ee20ea5e5758bd8c99de5fc6b16de3807f5ffa1c152e5bb6bae04ffd

  • SHA512

    afe6b6bbbcba29598c898ab45369ce47acdcf24b9cef5f73fbe6e559dc067b47d22cee4c7ae5e36ffd49762504a455fa27a3b026e8d0ebb4073bb1a463bde42f

  • SSDEEP

    768:vQz7yVEhs9+js1SQtOOtEvwDpjz9+4hdCW1nw71TkhsiPn1YFv6dl4GC:vj+jsMQMOtEvwDpj5HH1nw73KOFiY

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-16_02c36a9f4a91fb86c0793473c2ddd5d5_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-16_02c36a9f4a91fb86c0793473c2ddd5d5_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2972
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:1884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    57KB

    MD5

    34b186eded9c3cdd155238cb6c551e39

    SHA1

    5a7964c8758e63e281bf955cbda3656096e7c1cd

    SHA256

    f88342a1e40cad5f21d9fa3ebdee51a2c2b5c5ee2a0de16e0f93aa5891adcaea

    SHA512

    5f14badc52257bfe86d5e3d32a6a686df7f90276b4f5d8bb7e0f81ae36877bcc32aefbb637bedf8be8c81ca3d1932179324b2f271466c883a7115e705f953a44

  • memory/1884-15-0x0000000000300000-0x0000000000306000-memory.dmp

    Filesize

    24KB

  • memory/1884-22-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/2972-1-0x0000000000470000-0x0000000000476000-memory.dmp

    Filesize

    24KB

  • memory/2972-0-0x0000000000430000-0x0000000000436000-memory.dmp

    Filesize

    24KB

  • memory/2972-8-0x0000000000430000-0x0000000000436000-memory.dmp

    Filesize

    24KB