Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    04/06/2024, 04:55

General

  • Target

    2024-06-04_af1477411307d3ec5896aa000a076ade_cryptolocker.exe

  • Size

    34KB

  • MD5

    af1477411307d3ec5896aa000a076ade

  • SHA1

    f0ba6445f6a66e4e1bce178420e615555735b515

  • SHA256

    278abcff91e76e280ab2596168eef95c8fde57a14567e687312b58acfd0310f8

  • SHA512

    9ef7eab327dc8a383b72975dbd6ce8592a8359ca84b1e8480b1ab5a73e84e35e4b1c0e3f4b13615fb68d167a87edf905432183a4fdfc2a2da34571e3439a3b82

  • SSDEEP

    768:bxNQIE0eBhkL2Fo1CCwgfjOg9Arbkzos5jd+ad:bxNrC7kYo1Fxf2rYPsW

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-04_af1477411307d3ec5896aa000a076ade_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-04_af1477411307d3ec5896aa000a076ade_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2984
    • C:\Users\Admin\AppData\Local\Temp\pissa.exe
      "C:\Users\Admin\AppData\Local\Temp\pissa.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:1320

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\pissa.exe

          Filesize

          34KB

          MD5

          95a79aba0f65c515ae264ef7f082d469

          SHA1

          bbe2781482b7fdfd4c6fd9ccef6203d69eac3b82

          SHA256

          0c28de3a857fe1a582797184e94a77d545d82e38e51855ac0a749caa00c2c47c

          SHA512

          da99f3f8b5a94099a47ec57e1ede50bee151b12b3b34d59f4cba77acfed94ec0d75e53e34fe085232663ad35883d6ba7705fb66c5186cfa51f46ddb2e195e10e

        • memory/1320-15-0x0000000001CF0000-0x0000000001CF6000-memory.dmp

          Filesize

          24KB

        • memory/1320-22-0x00000000005B0000-0x00000000005B6000-memory.dmp

          Filesize

          24KB

        • memory/2984-2-0x0000000000580000-0x0000000000586000-memory.dmp

          Filesize

          24KB

        • memory/2984-0-0x0000000000470000-0x0000000000476000-memory.dmp

          Filesize

          24KB

        • memory/2984-1-0x0000000000470000-0x0000000000476000-memory.dmp

          Filesize

          24KB