Analysis

  • max time kernel
    150s
  • max time network
    176s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    18-01-2024 23:33

General

  • Target

    2024-01-18_f11b7aa1d782019f8005767227101a6b_cryptolocker.exe

  • Size

    43KB

  • MD5

    f11b7aa1d782019f8005767227101a6b

  • SHA1

    03c77e80f90eb2f67b6146ad8e50d012a4240a46

  • SHA256

    ac388de0ae5999c4bd5755b0cfd262451f7026e3a9634c4c7b7b03931cbbc1fb

  • SHA512

    5dd5443122fc892e33e1a19ef6eebd5f86c9e42712ad0165b5d20286d756bdbb1b8255b5e418e0b53ca2cd38c5a9f616db7241eda3779a8e23b6312d151d3960

  • SSDEEP

    768:bgX4zYcgTEu6QOaryfjqDlC6JFbK37Ylmbk:bgGYcA/53GAA6y37QmY

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-18_f11b7aa1d782019f8005767227101a6b_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-18_f11b7aa1d782019f8005767227101a6b_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2396
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    44KB

    MD5

    0794b54fa18ba119169ee2571ecbba02

    SHA1

    7fa7a6bbea2d28e94e2661472eb9045cda26ba81

    SHA256

    78318653d0b0c3979d6d83614b5ef9f889cb8fde9fca62609146cada92f09bac

    SHA512

    38be532e2f049082be20e96965a75d77e28f950008ecf23939d543077ca687f4cce2f01a5f295da528490090f374a81c65a68c0a203f702951375c12babafa02

  • memory/2396-0-0x0000000000270000-0x0000000000276000-memory.dmp

    Filesize

    24KB

  • memory/2396-2-0x0000000000270000-0x0000000000276000-memory.dmp

    Filesize

    24KB

  • memory/2396-1-0x0000000000290000-0x0000000000296000-memory.dmp

    Filesize

    24KB

  • memory/2844-15-0x0000000001CE0000-0x0000000001CE6000-memory.dmp

    Filesize

    24KB

  • memory/2844-19-0x0000000001CC0000-0x0000000001CC6000-memory.dmp

    Filesize

    24KB