Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    03-06-2024 23:23

General

  • Target

    2024-06-03_8469c8771277fc6ac34e1c7ffad8f794_cryptolocker.exe

  • Size

    87KB

  • MD5

    8469c8771277fc6ac34e1c7ffad8f794

  • SHA1

    4f310c603cbcf77dfd62a61d1c264f2cf8bf086f

  • SHA256

    ac78c29e997c158a1b84b1082636e9809b661c0164c97718097f7ca8e41a3766

  • SHA512

    a4cf0cd69d1d9432e66f48630893ebc603a8f7253c98b3fa23bf0fd65e2c92184f6b7db5ac0b2240c3a49e9c821a0a644974239b4a50a77d3b7aca95ccff206d

  • SSDEEP

    1536:vj+jsMQMOtEvwDpj5HwYYTjipvF2hBfWafHNBli:vCjsIOtEvwDpj5H9YvQd2k

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-03_8469c8771277fc6ac34e1c7ffad8f794_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-03_8469c8771277fc6ac34e1c7ffad8f794_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:376
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:2676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    87KB

    MD5

    7d20fcfdc16b48339074f37f727d5db9

    SHA1

    d006a785a32c2872fd7dc462c3ba70bd05651238

    SHA256

    25f55d2c732d644cc9ad814a18b3711b1f1c68d5ce6372611539e69e737b24a5

    SHA512

    3dc948fbfdcf53642a7388608b2692ae1e03ea486be7d26a57e0ddf21bc29d619f638cf502122a0ddfb1fe175f8ae121f10d2443aa88baaa22efc639e06c843b

  • memory/376-0-0x0000000000320000-0x0000000000326000-memory.dmp

    Filesize

    24KB

  • memory/376-8-0x0000000000320000-0x0000000000326000-memory.dmp

    Filesize

    24KB

  • memory/376-1-0x00000000003A0000-0x00000000003A6000-memory.dmp

    Filesize

    24KB

  • memory/2676-15-0x0000000000520000-0x0000000000526000-memory.dmp

    Filesize

    24KB

  • memory/2676-22-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB