Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-09-2024 12:19

General

  • Target

    2024-09-05_f9d5825ccff583cfdeab1e31cc2a19f1_cryptolocker.exe

  • Size

    40KB

  • MD5

    f9d5825ccff583cfdeab1e31cc2a19f1

  • SHA1

    9f81b4ab0d194c9095c546d3e460cc69db784fc1

  • SHA256

    87723a80e768ae59fe7a1d298e778eac0bc5c59ae98686d78639480987fb15d2

  • SHA512

    e4d0be867e5b1005fbb25566ee5d201d5d7386b5354187aed688b893f674aca0f482eec5a1bae2ccfcdcbcc7c811ed4b58d96922fe7da07ef5383b669862482d

  • SSDEEP

    768:UEEmoQDj/xnMp+yptndwe/PWQtOOtEvwDpjLeJAsKuD+l:ZzFbxmLPWQMOtEvwDpjLeJAsKcg

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-05_f9d5825ccff583cfdeab1e31cc2a19f1_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-05_f9d5825ccff583cfdeab1e31cc2a19f1_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2384
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1156

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    40KB

    MD5

    723dc0d1e530ae7187587380fa659458

    SHA1

    79e6e7435329ae5b8ea07e47357684320a23317b

    SHA256

    c0c38a5a69d60dcc4ed891323ad81ea919a74892f8694bd31548078c509c6fe1

    SHA512

    9db42d413fec72a0ae3c31445cc5b2921ed55457222ca660406470ea2ff5175f531eeced6add19a19355fe27733271db35bc3535f16709c392638ac494aee18f

  • memory/1156-16-0x0000000000460000-0x0000000000466000-memory.dmp

    Filesize

    24KB

  • memory/1156-23-0x0000000000320000-0x0000000000326000-memory.dmp

    Filesize

    24KB

  • memory/1156-24-0x0000000000230000-0x0000000000233000-memory.dmp

    Filesize

    12KB

  • memory/2384-1-0x0000000000340000-0x0000000000346000-memory.dmp

    Filesize

    24KB

  • memory/2384-0-0x0000000000230000-0x0000000000233000-memory.dmp

    Filesize

    12KB

  • memory/2384-2-0x0000000000380000-0x0000000000386000-memory.dmp

    Filesize

    24KB

  • memory/2384-9-0x0000000000340000-0x0000000000346000-memory.dmp

    Filesize

    24KB