Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    21-05-2024 15:55

General

  • Target

    2024-05-21_b910f37eeee1b0989d6f2f04d9bdadf4_cryptolocker.exe

  • Size

    62KB

  • MD5

    b910f37eeee1b0989d6f2f04d9bdadf4

  • SHA1

    c19e088a4d731e8cd1d9896385898762856aeac6

  • SHA256

    c11c0e0d45026d1d8e8e736f659486f62d125ba1e7e802a7ee3a589ce9b7a3b6

  • SHA512

    6f7931f9214a264af70e61cd0af706d72abc8b62387c30a81bda0c252c95f02f446d87e04e4b8296e8cbfbf78e346548feaad8b34bd91f108ae4a4b53a7bf935

  • SSDEEP

    768:3Uz7yVEhs9+Hs1SQtOOtEvwDpjO9+4hdCY8EQMjpi/Wpi3B3URiLqCyLuAx8XG9e:3P+HsMQMOtEvwDpjoHy7B3g9CWuAxWT3

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-21_b910f37eeee1b0989d6f2f04d9bdadf4_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-21_b910f37eeee1b0989d6f2f04d9bdadf4_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2600
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:1968

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    62KB

    MD5

    d82467ad252a7446ac96f0cd6a13b22c

    SHA1

    73b14fb06eaaba0fef66522765f5097c71e1e2db

    SHA256

    d65c2f840a6c10519ca8d734669c9e1edf46d7515f571d0107fa66d9dda73a08

    SHA512

    96e59a840f650ebf634e6bb1f8c78c973e0c624126aaff9bd7accb9bd2feaed06f3b7c655844a31c7409c00bea330c21eebd7667d5cc627ee9d4e6a6982fa27c

  • memory/1968-15-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/1968-17-0x00000000004A0000-0x00000000004A6000-memory.dmp

    Filesize

    24KB

  • memory/1968-24-0x0000000000300000-0x0000000000306000-memory.dmp

    Filesize

    24KB

  • memory/1968-25-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/2600-0-0x0000000000440000-0x0000000000446000-memory.dmp

    Filesize

    24KB

  • memory/2600-1-0x0000000000480000-0x0000000000486000-memory.dmp

    Filesize

    24KB

  • memory/2600-9-0x0000000000440000-0x0000000000446000-memory.dmp

    Filesize

    24KB

  • memory/2600-8-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB