Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    25/05/2024, 21:17

General

  • Target

    202405244a2e467599fd3fe7157fe0de27adab20cryptolocker.exe

  • Size

    49KB

  • MD5

    4a2e467599fd3fe7157fe0de27adab20

  • SHA1

    2513023b83500d91c6cc89e318a1e5a6b853f5ee

  • SHA256

    40a968ec095e01624a5a39b6398381863e3786329e29bc0f12ebcb686aa6ba05

  • SHA512

    ec0d94f58e2f25a13595e339d82a8c53b18848779f7672762570b8593afd3c383e215abc31527f99ad655bb1bce9e1d0ee57ba60519080fc1249472188e5a49d

  • SSDEEP

    768:vQz7yVEhs9+js1SQtOOtEvwDpjz9+4/Uth8igNrr42A7n0FmB0nNX:vj+jsMQMOtEvwDpj5HczerLO04B8X

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\202405244a2e467599fd3fe7157fe0de27adab20cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\202405244a2e467599fd3fe7157fe0de27adab20cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:108
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:2132

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\misid.exe

          Filesize

          49KB

          MD5

          e92982548d1a5b9fb57b832a9d113990

          SHA1

          dde68d612800b6c2f54015192745b375b725fa8f

          SHA256

          a22f27c74fb474f7d5e7d72b61f289fdc1b0afe856ea2fed0d5c8a7944f2db36

          SHA512

          62402dcccfb41234bba9baddf3b6caaad4157dedd40ad98afe078a08cbaa5dbb1c8778e229a2ccc8b3bdd61d0344050a5a6888128c244d0de6d4b288d39e1bc2

        • memory/108-0-0x00000000001D0000-0x00000000001D6000-memory.dmp

          Filesize

          24KB

        • memory/108-1-0x0000000000290000-0x0000000000296000-memory.dmp

          Filesize

          24KB

        • memory/108-8-0x00000000001D0000-0x00000000001D6000-memory.dmp

          Filesize

          24KB

        • memory/2132-15-0x00000000020B0000-0x00000000020B6000-memory.dmp

          Filesize

          24KB

        • memory/2132-22-0x00000000004F0000-0x00000000004F6000-memory.dmp

          Filesize

          24KB