Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16/05/2024, 20:11

General

  • Target

    2024-05-16_e54536ab0fe58dba9039346fb713488f_cryptolocker.exe

  • Size

    34KB

  • MD5

    e54536ab0fe58dba9039346fb713488f

  • SHA1

    d4a48d7f352f778dec16ac0ee99fb6a5fa6ef08e

  • SHA256

    5a4383391e3b54b428d5289b22292afd0beed1d20504020cca9da7500d304946

  • SHA512

    36b23b343a02ac5880f4d6a59866aaf3bc2070892a0a51b6cb6668e46719041caec27cbff7914827c20fb71364afc0596c1ff92dbd1a78a52536545681e7e83a

  • SSDEEP

    768:bxNQIE0eBhkL2Fo1CCwgfjOg9Arbkzos5M4g4:bxNrC7kYo1Fxf2rYA34

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-16_e54536ab0fe58dba9039346fb713488f_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-16_e54536ab0fe58dba9039346fb713488f_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Users\Admin\AppData\Local\Temp\pissa.exe
      "C:\Users\Admin\AppData\Local\Temp\pissa.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:2508

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\pissa.exe

          Filesize

          34KB

          MD5

          c82a527d146de1f84b652c181fd67432

          SHA1

          7a5cf62f4a6c0f70d1996c3287730e60a609367a

          SHA256

          f98bff40b92279b3cbe1a4d921b0946367d885ccd69aff77af2987731ccf2914

          SHA512

          844a4cfb7155c198fafd4b9b744e7f28b8633b2634105a8d6f17acaff40daabf78528fe25d46221cb196dd324d786a16a3760e09328afc6be6b8f631bd7541d4

        • memory/2172-0-0x0000000000290000-0x0000000000296000-memory.dmp

          Filesize

          24KB

        • memory/2172-1-0x0000000000580000-0x0000000000586000-memory.dmp

          Filesize

          24KB

        • memory/2172-8-0x0000000000290000-0x0000000000296000-memory.dmp

          Filesize

          24KB

        • memory/2508-15-0x0000000000480000-0x0000000000486000-memory.dmp

          Filesize

          24KB

        • memory/2508-22-0x0000000000470000-0x0000000000476000-memory.dmp

          Filesize

          24KB