Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    03/09/2024, 06:02

General

  • Target

    2024-09-03_64365643c5f1d6fc770211b42575b285_cryptolocker.exe

  • Size

    64KB

  • MD5

    64365643c5f1d6fc770211b42575b285

  • SHA1

    10061a5812002e2848471b9f58f135b614008b45

  • SHA256

    c27be64614f36266575f9e16831b044e9d40a419c68198864a83ff1d406cabe6

  • SHA512

    1855ea2a41f4694b3991f93b36da27142a49894f8bc02c16e21b9102196d2a34683cf72c40e221c791171721ef045b6158eaf24ab1d39d2bfa63ae3ea80e5ed1

  • SSDEEP

    768:0Qz7yVEhs9+syJP6ntOOtEvwDpjFSXOQ69zbjlAAX5e9zR:0j+soPSMOtEvwDpjwizbR9XwzR

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-03_64365643c5f1d6fc770211b42575b285_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-03_64365643c5f1d6fc770211b42575b285_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2528
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    64KB

    MD5

    36a11576416943593be130a5d2d2a43c

    SHA1

    126f4f3e4672902faa96061b12577f6ef44740dd

    SHA256

    0d9317c9c7736b9f81cf07b758d021680b72c4cd85ff852a85d07b9ce480b191

    SHA512

    51c0ef6e0e75dc0129e9eedb7930136d7727d229c933380540a953ad031b32ea474c333621ba13806f070cb27b10738aee38e5f879b727c3d986798a25c70eb4

  • memory/1912-17-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/1912-19-0x00000000002F0000-0x00000000002F6000-memory.dmp

    Filesize

    24KB

  • memory/1912-26-0x00000000002B0000-0x00000000002B6000-memory.dmp

    Filesize

    24KB

  • memory/1912-27-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2528-0-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2528-2-0x0000000000380000-0x0000000000386000-memory.dmp

    Filesize

    24KB

  • memory/2528-9-0x0000000000340000-0x0000000000346000-memory.dmp

    Filesize

    24KB

  • memory/2528-1-0x0000000000340000-0x0000000000346000-memory.dmp

    Filesize

    24KB

  • memory/2528-15-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2528-13-0x0000000001F20000-0x0000000001F30000-memory.dmp

    Filesize

    64KB