Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2024, 13:41

General

  • Target

    2024-10-13_0efc8f4e30f5d91d470377781130d3eb_cryptolocker.exe

  • Size

    69KB

  • MD5

    0efc8f4e30f5d91d470377781130d3eb

  • SHA1

    ca347c2dd1d00592f999553bee1302e8f3010a1d

  • SHA256

    f3ddb2eb5007f2c79be77508d1d673edcc52778443705f7bc82bfa255635d242

  • SHA512

    e081a4ab2681c79ea677414af3d268b1f407ac58ab6a18babece0791125da0b4478fe99a3341d4b5d9d13f187d3a0367e2a231998032d69f82dac8204d450995

  • SSDEEP

    1536:Tj+jsMQMOtEvwDpj5HmpJpOUHECgNMo0vp2l9tMPvdfGy7Z:TCjsIOtEvwDpj5HE/OUHnSMYi

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-13_0efc8f4e30f5d91d470377781130d3eb_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-13_0efc8f4e30f5d91d470377781130d3eb_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2592

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\misid.exe

          Filesize

          69KB

          MD5

          2b5ddbfc32cc9745010328c880c7709c

          SHA1

          778cbe9f5a57f87e0b1bd843128b11bb286737c6

          SHA256

          32eb8171ee0cb2682117ac2572971ee87cd4aba955aeb95693b1f0cec3955114

          SHA512

          177d8d400a4c30a4714e3d1b063afa9b05262edf4305297c3c24c8ba3e8a904d4e779e687e36d17316e202388747f988b2f99fdd5fff06d1df9aeaf7fe927c5b

        • memory/2036-0-0x0000000000500000-0x000000000050E000-memory.dmp

          Filesize

          56KB

        • memory/2036-1-0x00000000002C0000-0x00000000002C6000-memory.dmp

          Filesize

          24KB

        • memory/2036-2-0x0000000000300000-0x0000000000306000-memory.dmp

          Filesize

          24KB

        • memory/2036-9-0x00000000002C0000-0x00000000002C6000-memory.dmp

          Filesize

          24KB

        • memory/2036-14-0x0000000000500000-0x000000000050E000-memory.dmp

          Filesize

          56KB

        • memory/2592-16-0x0000000000500000-0x000000000050E000-memory.dmp

          Filesize

          56KB

        • memory/2592-19-0x0000000000340000-0x0000000000346000-memory.dmp

          Filesize

          24KB

        • memory/2592-18-0x00000000002C0000-0x00000000002C6000-memory.dmp

          Filesize

          24KB

        • memory/2592-26-0x0000000000500000-0x000000000050E000-memory.dmp

          Filesize

          56KB