Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    11/01/2024, 05:53

General

  • Target

    2024-01-10_908b5aaccd18efc360d1593788f3de10_cryptolocker.exe

  • Size

    38KB

  • MD5

    908b5aaccd18efc360d1593788f3de10

  • SHA1

    d9ee64b73bd4d0572bfb40cace8619b674eff806

  • SHA256

    ec8226c2630b54467c230baa30d7965e6311665cc7aa17020c3dd477f5f827ea

  • SHA512

    9e1813b564251e3af563bef46743977eae23afeb6b88afc50118a9264b576eb05c56b2661acc5d8fa7ab1f5a3b31fe07fa4beda8e27504427dde6829029722a5

  • SSDEEP

    768:bgX4zYcgTEu6QOaryfjqDDw3sCu529hJy:bgGYcA/53GADw8Ch9K

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-10_908b5aaccd18efc360d1593788f3de10_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-10_908b5aaccd18efc360d1593788f3de10_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2448
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    38KB

    MD5

    6ba9743e422b14d12d2defe2e9e9e34c

    SHA1

    fd00f726ba176069d17fb6bcb65f6954bd71fc2a

    SHA256

    73c3b06e4620d157b5114b628d8c6547832b7154905bac8feb132d6f9b371f3c

    SHA512

    a818e88c64ff587880bb7091a2b988d9644b1cc8aede9c3d709c2ca8b2add07e0b90154eeb79e4a2662b0b450a873cd16913763a82c5cca5e9986d51e65b8c4c

  • memory/2448-0-0x0000000000270000-0x0000000000276000-memory.dmp

    Filesize

    24KB

  • memory/2448-1-0x0000000000390000-0x0000000000396000-memory.dmp

    Filesize

    24KB

  • memory/2448-2-0x0000000000270000-0x0000000000276000-memory.dmp

    Filesize

    24KB

  • memory/2748-15-0x0000000001CE0000-0x0000000001CE6000-memory.dmp

    Filesize

    24KB

  • memory/2748-17-0x0000000001CC0000-0x0000000001CC6000-memory.dmp

    Filesize

    24KB