Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 03:46

General

  • Target

    2024-09-19_f8f17949c5c6d361ea79e996ada66a97_cryptolocker.exe

  • Size

    93KB

  • MD5

    f8f17949c5c6d361ea79e996ada66a97

  • SHA1

    81abc6b9157a2e3bd1593d6e83deb35d37b11006

  • SHA256

    6d88d4ca045ceb522aef47d7fd681c37d19a1b17017276804f563d73a4e5819b

  • SHA512

    00bc71947dac266ef072993a8b7a39c33b78bd0bfbf7725f78941c49274d8a9aa76ef89048fd8b06a6614471b264ca4cf0ba10678bfa022ad1832f63668de316

  • SSDEEP

    1536:vj+jsMQMOtEvwDpj5H8u8rBN6nqEZNi1OkQNpZYz6:vCjsIOtEvwDpj5H8zPsw6

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-19_f8f17949c5c6d361ea79e996ada66a97_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-19_f8f17949c5c6d361ea79e996ada66a97_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2516
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2360

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    93KB

    MD5

    e821e84756cd74bcfea95a294d1ece11

    SHA1

    4532127f2ce724b53ae66e0c6e70018f9e410152

    SHA256

    a9e7e091640ac2fcfab5d751e765261a38440e383b094750f0e9fe0ead7c0167

    SHA512

    9a83cb55ad114944438ae721941abfe63b3f9970ddc5e66f2073aa4f1ac6fe92e20d0325708b716073203a53f8d808beee8f64db7d30c37c38955d9b18ccd6ef

  • memory/2360-15-0x0000000000490000-0x0000000000496000-memory.dmp

    Filesize

    24KB

  • memory/2360-22-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2516-0-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/2516-8-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/2516-1-0x0000000000310000-0x0000000000316000-memory.dmp

    Filesize

    24KB