Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2024, 03:28

General

  • Target

    2024-09-21_3ff79ca48313c0d0fdfd91505869f240_cryptolocker.exe

  • Size

    96KB

  • MD5

    3ff79ca48313c0d0fdfd91505869f240

  • SHA1

    cdcc63d7d0b8534467e46e1bf1a5ae10aa21b744

  • SHA256

    a4d559a5fa44e52ca7eaadb27c1a9b2dbf06169b54da65e58e975f1ea56591a9

  • SHA512

    735f8d227c14ebd77db83d9c82c0c22aa231e8584b1c3953351f9a2679401ffc3221a4ec9ee0178dd7cd197e67adc95252eaa6ed3eeeb0583ab99837129fbd9c

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/kOg:zCsanOtEvwDpjBa

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-21_3ff79ca48313c0d0fdfd91505869f240_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-21_3ff79ca48313c0d0fdfd91505869f240_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2888
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1992

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    96KB

    MD5

    0ca4817c8ea798a93fe427ee2a2567a4

    SHA1

    ab3bc8474a3fa808de61c9b18dba5a8ed8af736b

    SHA256

    55bb8f51235b293f18bb7a2d1159ad6aefded7d841341443113cfc05d6fe5b9d

    SHA512

    94ed1b8c7194c0d29f3390214168dc59d3b3e35e27e7cca9b947f83c5910b4b1c00f3c8c672ee4a9297a6ddc3a08b7e74eaad7acf627ca0d7e90faef5744ae00

  • memory/1992-16-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/1992-18-0x0000000000380000-0x0000000000386000-memory.dmp

    Filesize

    24KB

  • memory/1992-25-0x0000000000340000-0x0000000000346000-memory.dmp

    Filesize

    24KB

  • memory/1992-26-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2888-0-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2888-1-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2888-2-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2888-3-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB

  • memory/2888-15-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB