Analysis

  • max time kernel
    0s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    09/01/2024, 06:37

General

  • Target

    2024-01-08_19df4e3828fffb4c996461e593d558dd_cryptolocker.exe

  • Size

    44KB

  • MD5

    19df4e3828fffb4c996461e593d558dd

  • SHA1

    5e8b1b57cc4a3305629c2ee7b6386c520996e593

  • SHA256

    d456ac5d61224ec7b6bfbee76612338af7ae0f7f91a131370ce0fde06be5f0fc

  • SHA512

    911c130f082f7bdd7bac9bc5892d9135e81d6d6fcf7557cf3a8ebf4c71a5b655163a9292cb749bb8b84ed367034ff65b6be0bd6200add0e7222645b38576b436

  • SSDEEP

    768:bgX4zYcgTEu6QOaryfjqDlC6JFbK37YbDu5z/hT:bgGYcA/53GAA6y37nbT

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-08_19df4e3828fffb4c996461e593d558dd_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-08_19df4e3828fffb4c996461e593d558dd_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2980
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    44KB

    MD5

    5239a696961702f4460fbccd75f66a5d

    SHA1

    5288da0882ef51f62d867e2679ab5e98c27979b6

    SHA256

    a022416bb9a44daef09729deef9264027358faf201f1786cf982aed9389fcecb

    SHA512

    57309642ca9fa73e29aa77a7bedd1f809d8bf0d7c2d472d4399978a3fab7502be70d64f418e3c6d1f06f0c939bf84a1a92e173162aede67227678b629a57a8df

  • memory/2856-22-0x0000000000470000-0x0000000000476000-memory.dmp

    Filesize

    24KB

  • memory/2856-15-0x0000000000480000-0x0000000000486000-memory.dmp

    Filesize

    24KB

  • memory/2980-1-0x0000000000390000-0x0000000000396000-memory.dmp

    Filesize

    24KB

  • memory/2980-8-0x0000000000380000-0x0000000000386000-memory.dmp

    Filesize

    24KB

  • memory/2980-0-0x0000000000380000-0x0000000000386000-memory.dmp

    Filesize

    24KB