Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 03:03

General

  • Target

    2024-09-08_9de472c2f48cfde971677c4118e5d141_cryptolocker.exe

  • Size

    35KB

  • MD5

    9de472c2f48cfde971677c4118e5d141

  • SHA1

    57e40a0a5b8ad84dbcad4f9f4230d1f909cf1170

  • SHA256

    8df3a2bf526b535535e551b44aafe1b9350f9a6822e8aef3784325f7bd91e098

  • SHA512

    6d9ca7fce9e5f8de2ecace7493c243182256366e9022fcce948def6f12e4b4016fd2148b21c62dcfebdfa2e8473baddaaf0a588401d7829bf767aaf069427399

  • SSDEEP

    768:bxNQIE0eBhkL2Fo1CCwgfjOg9Arbkzos5jmUZ:bxNrC7kYo1Fxf2rYPLZ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-08_9de472c2f48cfde971677c4118e5d141_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-08_9de472c2f48cfde971677c4118e5d141_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Users\Admin\AppData\Local\Temp\pissa.exe
      "C:\Users\Admin\AppData\Local\Temp\pissa.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2660

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\pissa.exe

    Filesize

    35KB

    MD5

    72a932a005d448df57a569d919f8189a

    SHA1

    54926471a21582b5c2a18446cb3952defd504207

    SHA256

    0025adf343d06040caee4d93555247703c7f6ed873b56fdddea09414655d1614

    SHA512

    a216807e1500a239fb5d7fb88002ed8052235f969ffba2a22f85e121f16b6393ed73afbf8d1e12cdf344a7b3d1e0d7414bd9cabc6cb7dc10af06d8fe110c5676

  • memory/2380-0-0x0000000000570000-0x0000000000576000-memory.dmp

    Filesize

    24KB

  • memory/2380-8-0x0000000000570000-0x0000000000576000-memory.dmp

    Filesize

    24KB

  • memory/2380-1-0x0000000001CB0000-0x0000000001CB6000-memory.dmp

    Filesize

    24KB

  • memory/2660-15-0x00000000003B0000-0x00000000003B6000-memory.dmp

    Filesize

    24KB

  • memory/2660-22-0x00000000003A0000-0x00000000003A6000-memory.dmp

    Filesize

    24KB