Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-10-2024 03:26

General

  • Target

    2024-10-03_4594f97f67244ecfcc5c894e23231ba1_cryptolocker.exe

  • Size

    41KB

  • MD5

    4594f97f67244ecfcc5c894e23231ba1

  • SHA1

    2995b3403cd40b65035913b4366144d3deacfc58

  • SHA256

    a5e066ef93f93b6637b98d8109fa63808ab408b36dfc1ea5746e1ddee8f28c25

  • SHA512

    386b07400482eb2058ceef0266e9ac3a9f457be7fc29bf37390b09230e4e7d51574efa696b3c68c5de005e6c416f478808625e6c51af7a0680c2130161ecb1ed

  • SSDEEP

    768:UEEmoQDj/xnMp+yptndwe/PWQtOOtEvwDpjLeJAsKuD+h:ZzFbxmLPWQMOtEvwDpjLeJAsKcs

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-03_4594f97f67244ecfcc5c894e23231ba1_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-03_4594f97f67244ecfcc5c894e23231ba1_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2736
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    41KB

    MD5

    5a171ed284a09a4781b3fbffae039559

    SHA1

    26f6e1dee705ef32e8237bf5c94dd57a155ad1fd

    SHA256

    d1744f4fe4e2e1e7adc945ad4f1e0cc4cb0eb2cc13480978a56d526db628b32d

    SHA512

    0fd110dde427479fdff0bedb3ce5a6f767c264e19a58e13715759302a7202dd96b217f132814bfeff5b2bfa82d6480d1c2c505b75954c27aa8ff251d815ddc04

  • memory/2736-0-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2736-1-0x0000000000380000-0x0000000000386000-memory.dmp

    Filesize

    24KB

  • memory/2736-8-0x0000000000230000-0x0000000000236000-memory.dmp

    Filesize

    24KB

  • memory/2736-9-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2828-15-0x0000000000230000-0x0000000000233000-memory.dmp

    Filesize

    12KB

  • memory/2828-17-0x00000000004B0000-0x00000000004B6000-memory.dmp

    Filesize

    24KB

  • memory/2828-24-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/2828-25-0x0000000000230000-0x0000000000233000-memory.dmp

    Filesize

    12KB