Analysis

  • max time kernel
    601s
  • max time network
    601s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    16-09-2021 20:28

General

  • Target

    2f3a3462e46a5373d2087cb030289c361270e4b5b8799e4d5ca422e83f4e988d.exe

  • Size

    338KB

  • MD5

    3a474a22a2ddd5ba05031a4f3ff309e1

  • SHA1

    b9d3d30e54468d0cdaf3dddd044378cf101e179d

  • SHA256

    2f3a3462e46a5373d2087cb030289c361270e4b5b8799e4d5ca422e83f4e988d

  • SHA512

    b00f87a23a4ad38b1a52fb77b5a507c7a5e4ac36025559bc5f1589aad76f58ddc99b940e4cdd78c9085fe4128362c3740b9f524ff2288e0826e051e980061e77

Malware Config

Signatures

  • CryptoLocker

    Ransomware family with multiple variants.

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2f3a3462e46a5373d2087cb030289c361270e4b5b8799e4d5ca422e83f4e988d.exe
    "C:\Users\Admin\AppData\Local\Temp\2f3a3462e46a5373d2087cb030289c361270e4b5b8799e4d5ca422e83f4e988d.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:532
    • C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe
      "C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" "/rC:\Users\Admin\AppData\Local\Temp\2f3a3462e46a5373d2087cb030289c361270e4b5b8799e4d5ca422e83f4e988d.exe"
      2⤵
      • Executes dropped EXE
      • Deletes itself
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:660
      • C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe
        "C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" /w00000220
        3⤵
        • Executes dropped EXE
        PID:3988

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe

    MD5

    3a474a22a2ddd5ba05031a4f3ff309e1

    SHA1

    b9d3d30e54468d0cdaf3dddd044378cf101e179d

    SHA256

    2f3a3462e46a5373d2087cb030289c361270e4b5b8799e4d5ca422e83f4e988d

    SHA512

    b00f87a23a4ad38b1a52fb77b5a507c7a5e4ac36025559bc5f1589aad76f58ddc99b940e4cdd78c9085fe4128362c3740b9f524ff2288e0826e051e980061e77

  • C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe

    MD5

    3a474a22a2ddd5ba05031a4f3ff309e1

    SHA1

    b9d3d30e54468d0cdaf3dddd044378cf101e179d

    SHA256

    2f3a3462e46a5373d2087cb030289c361270e4b5b8799e4d5ca422e83f4e988d

    SHA512

    b00f87a23a4ad38b1a52fb77b5a507c7a5e4ac36025559bc5f1589aad76f58ddc99b940e4cdd78c9085fe4128362c3740b9f524ff2288e0826e051e980061e77

  • C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe

    MD5

    3a474a22a2ddd5ba05031a4f3ff309e1

    SHA1

    b9d3d30e54468d0cdaf3dddd044378cf101e179d

    SHA256

    2f3a3462e46a5373d2087cb030289c361270e4b5b8799e4d5ca422e83f4e988d

    SHA512

    b00f87a23a4ad38b1a52fb77b5a507c7a5e4ac36025559bc5f1589aad76f58ddc99b940e4cdd78c9085fe4128362c3740b9f524ff2288e0826e051e980061e77

  • memory/660-114-0x0000000000000000-mapping.dmp

  • memory/3988-117-0x0000000000000000-mapping.dmp