Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    06/08/2024, 07:51

General

  • Target

    2024-08-06_701f2ac6b2e179f780bce7ef30118faa_cryptolocker.exe

  • Size

    73KB

  • MD5

    701f2ac6b2e179f780bce7ef30118faa

  • SHA1

    47d6873de2e868103216c68912ef6781660181ef

  • SHA256

    0771eca5b75f85382422a13b6216477254db82563b4fff4f988910480a089ecb

  • SHA512

    802190d8b5a07ffd814107d855c95591d07d10c9f31c9991f5eca4f0df25e37df52e9032f44a0c6923026d93fb3e16a15ef21ff60e39fff60b4fa55ebdf008fa

  • SSDEEP

    768:vQz7yVEhs9+js1SQtOOtEvwDpjz9+4ZPsED3VK2+ZtyOjgO4r9vFAg2rq2g1B/RS:vj+jsMQMOtEvwDpj5HZYTjipvF24pQ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-08-06_701f2ac6b2e179f780bce7ef30118faa_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-08-06_701f2ac6b2e179f780bce7ef30118faa_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:632

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\misid.exe

          Filesize

          73KB

          MD5

          6a2527f3d5a76a5bce620e8930529c4c

          SHA1

          f6fecc37739d0d76fbd58b13b66c8c503d25d0c4

          SHA256

          63d1d710f326acb9abd52bdcadeab2e4ca76537b6fd44d2b0791dedc87bf1876

          SHA512

          0cad9379f3d4317494608e92d280bd6fdb746d8835bfa8341a6db56bb28488ff29fd787efb7168d664b649d2eec5d6867a40d6e81f8d57334b007518e7ae8509

        • memory/632-15-0x0000000000600000-0x0000000000606000-memory.dmp

          Filesize

          24KB

        • memory/632-22-0x00000000002C0000-0x00000000002C6000-memory.dmp

          Filesize

          24KB

        • memory/1944-0-0x00000000001E0000-0x00000000001E6000-memory.dmp

          Filesize

          24KB

        • memory/1944-1-0x00000000002A0000-0x00000000002A6000-memory.dmp

          Filesize

          24KB

        • memory/1944-8-0x00000000001E0000-0x00000000001E6000-memory.dmp

          Filesize

          24KB