Analysis

  • max time kernel
    120s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 18:20

General

  • Target

    2024-05-23_d6f22aaa32809e48d3052cad0c2a7951_cryptolocker.exe

  • Size

    71KB

  • MD5

    d6f22aaa32809e48d3052cad0c2a7951

  • SHA1

    92d3a70134d39e746838b63a042389cfc9f8ea60

  • SHA256

    a6e5e588a522288590704cd2ebb6cfc652a6dcfdc7711e6137c0a497adb4e816

  • SHA512

    da7fa646fbc938f6a2d81802d655f3af08fe872ee36f9e6441418ebdd0f08c67a4049be549f529fdab9f2de04e8bd8b7fb7f8e8703cd4aacb01f1e3d99605130

  • SSDEEP

    768:vQz7yVEhs9+js1SQtOOtEvwDpjz9+4ZPsED3VK2+ZtyOjgO4r9vFAg2rq2g1B/R+:vj+jsMQMOtEvwDpj5HZYTjipvF24c5

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-23_d6f22aaa32809e48d3052cad0c2a7951_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-23_d6f22aaa32809e48d3052cad0c2a7951_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2412
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:2644

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\misid.exe
    Filesize

    72KB

    MD5

    88bbe440980759578e1775a603c4125c

    SHA1

    5a6dc2d1de6925a076596a6fd7bc2a4136cc4f4e

    SHA256

    e9c3f85a95fa3eff33decf027212498ca925064295fc5d4d3d0c22972a906d36

    SHA512

    066efab52c483301ecc2e7e5885d8687facd35319818b5426fad200133a5b057a4154f8786f15b3d530528b95385f1e18d448c6a32581c8c727b7204db31f310

  • memory/2412-0-0x0000000000240000-0x0000000000246000-memory.dmp
    Filesize

    24KB

  • memory/2412-1-0x0000000000280000-0x0000000000286000-memory.dmp
    Filesize

    24KB

  • memory/2412-8-0x0000000000240000-0x0000000000246000-memory.dmp
    Filesize

    24KB

  • memory/2644-15-0x0000000000470000-0x0000000000476000-memory.dmp
    Filesize

    24KB

  • memory/2644-22-0x00000000002C0000-0x00000000002C6000-memory.dmp
    Filesize

    24KB