Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 00:25

General

  • Target

    2024-09-07_08fe2dbb80832ea5b379d55e47e936a0_cryptolocker.exe

  • Size

    77KB

  • MD5

    08fe2dbb80832ea5b379d55e47e936a0

  • SHA1

    f0a45abca15fb7d4d61089fee09657bf2917c3c3

  • SHA256

    97f62b26f092add912a9e7d6ae1ea042a2065edba6ade5ea8edc0ae742033d17

  • SHA512

    cadc64c383f2994fbdc408ed73ad064f0647eb0b786c03cf6aca4119d8af2e2e93f3cd1597614fa2a5f22475b6cb4eff37a872838921aa9eaf1c1bd2839533b0

  • SSDEEP

    1536:ZzFbxmLPWQMOtEvwDpj386Sj/WprgJN6tZdOyJ3KUM:ZVxkGOtEvwDpjcao

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-07_08fe2dbb80832ea5b379d55e47e936a0_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-07_08fe2dbb80832ea5b379d55e47e936a0_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2648

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\misid.exe

          Filesize

          77KB

          MD5

          0e17cb6f050beb56e28e9332eef1ac6c

          SHA1

          e978b8ee93f51ad9204aa8c2d2253672775a1c40

          SHA256

          d4b715e5e4760e05c5609e3229aba47ed766af542f2c411afd5ff6c50d8bf764

          SHA512

          570557478d1c48581b51a2dd6ff4b795429748a7ccccb76ebd1e2c77f2dcb07d1dba9cf58d5b2d75128a3eefdb4c213a7cd3668ef80e5ce63933d82690471465

        • memory/2232-1-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/2232-0-0x0000000000230000-0x0000000000233000-memory.dmp

          Filesize

          12KB

        • memory/2232-9-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/2232-2-0x0000000000480000-0x0000000000486000-memory.dmp

          Filesize

          24KB

        • memory/2648-15-0x0000000000240000-0x0000000000243000-memory.dmp

          Filesize

          12KB

        • memory/2648-17-0x0000000000370000-0x0000000000376000-memory.dmp

          Filesize

          24KB

        • memory/2648-24-0x0000000000330000-0x0000000000336000-memory.dmp

          Filesize

          24KB

        • memory/2648-25-0x0000000000240000-0x0000000000243000-memory.dmp

          Filesize

          12KB