Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2024, 06:24

General

  • Target

    2024-10-12_03c14adef8287c661d5c8265147ab409_cryptolocker.exe

  • Size

    40KB

  • MD5

    03c14adef8287c661d5c8265147ab409

  • SHA1

    95e96068234b9c3d62a1bf6ab8419f5a1df2bd6d

  • SHA256

    8e4887adfc3d79e352b58a993a5b443ba009269bfc376462c1400032557ddcc5

  • SHA512

    54ca1fe1e80d66058c7c25be724d94c900b733e325fd8c4ce55b6873b82175241a167976b15fab733818c44d8517840ed3c39f38f2803d3f78bd1bf64d1b5602

  • SSDEEP

    768:fTz7y3lhsT+hs1SQtOOtEvwDpjfAu9+4qc:fT+hsMQMOtEvwDpjoIHL

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-12_03c14adef8287c661d5c8265147ab409_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-12_03c14adef8287c661d5c8265147ab409_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1624
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2336

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\misid.exe

          Filesize

          40KB

          MD5

          fd82bae7062e629e79167d5cf040de5b

          SHA1

          6bb160ba0544c5a8fe9c48e1f039ce7675bf5680

          SHA256

          57601d19690bd66c6cadc38ce938adfbc3f0d481b3470950c4acaa9a1f73187c

          SHA512

          b044854a1764a55bc832e7cc95d7e57222d309936ea65671b5a0729fed9a824ece83b87286bf6f6596cc30cb3ff7af04c4de1bf1a92803d30b4bc8c9a1155b2f

        • memory/1624-0-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/1624-1-0x0000000000280000-0x0000000000286000-memory.dmp

          Filesize

          24KB

        • memory/1624-8-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/2336-15-0x0000000000290000-0x0000000000296000-memory.dmp

          Filesize

          24KB