Analysis

  • max time kernel
    0s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    04/01/2024, 15:13

General

  • Target

    2024-01-03_24b1ebdc4f235209426d00e2d41f60e5_cryptolocker.exe

  • Size

    45KB

  • MD5

    24b1ebdc4f235209426d00e2d41f60e5

  • SHA1

    d96545f7ff31674af2e8b86c4e494324dcdcd3c7

  • SHA256

    c4db06bcb666732932aaed3b8c3224fa527b18c9fd3a88c03c4af2efc4a546a3

  • SHA512

    2e2b1bed3f885c131db219c713220a9e40feeb5504cfd23970487dd7d37832c4e4b7431f0d1ac59bab3aa5bb87614618d56086abaedaaaae4c46e261c9c17048

  • SSDEEP

    768:bgX4zYcgTEu6QOaryfjqDlC6JFbK37Yl6deMx:bgGYcA/53GAA6y37Q6dB

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-03_24b1ebdc4f235209426d00e2d41f60e5_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-03_24b1ebdc4f235209426d00e2d41f60e5_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2724
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2352

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

          Filesize

          17KB

          MD5

          f8cb9ead3a4926ceb01e6e3d0eb17094

          SHA1

          6a49023954c431d8d905bc0c91310b1cb8ec54da

          SHA256

          237ab74e9bd3a519da53b62538c0369244bdd8c1fe6d860c1967e0f2ec3027e4

          SHA512

          9bee08959479f9ece5e9c20270c5828b9f6994fa08b8188e2f4246919e6c78dbfe0a06473b218db759dd694187de06dc0989a792c98fc19d934fb3f04adf0ea3

        • memory/2352-15-0x0000000000480000-0x0000000000486000-memory.dmp

          Filesize

          24KB

        • memory/2352-17-0x0000000000470000-0x0000000000476000-memory.dmp

          Filesize

          24KB

        • memory/2724-0-0x0000000000350000-0x0000000000356000-memory.dmp

          Filesize

          24KB

        • memory/2724-8-0x0000000000350000-0x0000000000356000-memory.dmp

          Filesize

          24KB

        • memory/2724-1-0x0000000000360000-0x0000000000366000-memory.dmp

          Filesize

          24KB