Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11/09/2024, 04:28

General

  • Target

    2024-09-11_7b85aa0c5c299f43b1dc49f5ec74a0cc_cryptolocker.exe

  • Size

    46KB

  • MD5

    7b85aa0c5c299f43b1dc49f5ec74a0cc

  • SHA1

    5dff428c58bb8ea92e236f0aebcd148bc6e3f151

  • SHA256

    6088843898f405e72bbbc1c0d7031c52d38fdd839b208795c393870a5a7120f1

  • SHA512

    a26e43ba3ece66d116ff34ada5a0268561604a581caee0618e16a44f63b6aeb410c2926a9ec173d78f5146eace98c8aa13009676242ac36923b0afcf2f8d07bf

  • SSDEEP

    768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqh6/aMDAO:6j+1NMOtEvwDpjrRrT

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-11_7b85aa0c5c299f43b1dc49f5ec74a0cc_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-11_7b85aa0c5c299f43b1dc49f5ec74a0cc_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2260
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2680

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\misid.exe

          Filesize

          47KB

          MD5

          7538fc55540cf6b7dfda87d0572dda20

          SHA1

          b18391908b8343ea68b75e6b01806d432f3da565

          SHA256

          2b095f9dd9a93beaa3c9134cf249a9446ee86ebb400f9552c6b69f61e3608cc4

          SHA512

          7c3833ce2820fcc8ec36f5b1fa33bba2c12e52b7e0cbffa8886377b002e0f930a58bd352544a6b15b26501937df38e678385fb5b051c0641358dbbab879e7dad

        • memory/2260-15-0x0000000000500000-0x000000000050F000-memory.dmp

          Filesize

          60KB

        • memory/2260-13-0x0000000000540000-0x000000000054F000-memory.dmp

          Filesize

          60KB

        • memory/2260-9-0x0000000000320000-0x0000000000326000-memory.dmp

          Filesize

          24KB

        • memory/2260-2-0x0000000000460000-0x0000000000466000-memory.dmp

          Filesize

          24KB

        • memory/2260-1-0x0000000000500000-0x000000000050F000-memory.dmp

          Filesize

          60KB

        • memory/2260-0-0x0000000000320000-0x0000000000326000-memory.dmp

          Filesize

          24KB

        • memory/2680-26-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/2680-19-0x0000000000290000-0x0000000000296000-memory.dmp

          Filesize

          24KB

        • memory/2680-17-0x0000000000500000-0x000000000050F000-memory.dmp

          Filesize

          60KB

        • memory/2680-27-0x0000000000500000-0x000000000050F000-memory.dmp

          Filesize

          60KB