Analysis

  • max time kernel
    12s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    23/01/2024, 07:40

General

  • Target

    2024-01-23_75e39820a6c7fea51c43835bcf89690e_cryptolocker.exe

  • Size

    32KB

  • MD5

    75e39820a6c7fea51c43835bcf89690e

  • SHA1

    96a7cdb6950aee44c0999d031ba11ac689a8f510

  • SHA256

    b7c3c14ef41f70b6450214d85d60caf2d9700883d13c20f95c131d3738fd258b

  • SHA512

    14a4689bb98a7c44348054bce807e6d0e7fc4293e0329a948c58d61c9ebc141dab00b5e84e02308f3fdc47e7bfa2581625325d4e3a344ded3b3afb210521c109

  • SSDEEP

    384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSznHzu02lOQAu:b/yC4GyNM01GuQMNXw2PSjHC02ltAu

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-23_75e39820a6c7fea51c43835bcf89690e_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-23_75e39820a6c7fea51c43835bcf89690e_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2104
    • C:\Users\Admin\AppData\Local\Temp\retln.exe
      "C:\Users\Admin\AppData\Local\Temp\retln.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2248

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\retln.exe

          Filesize

          32KB

          MD5

          4a422fc735c9d988af8f6a2e76633797

          SHA1

          8c14685cc6881e7947d6a0870c0c066978b7c82d

          SHA256

          df9304f1b05291e9dede633f44134e7c1c0d68ff34681d22868634d204ee882e

          SHA512

          57044271e877a9515541daa9c596a1c23a8c9b20618eca6371b30e2c9a3eb0f614137c59bef4faa531179c9eb1e4a0dc6936f4b525084a6a596e3d98310bb1bb

        • memory/2104-0-0x00000000002B0000-0x00000000002B6000-memory.dmp

          Filesize

          24KB

        • memory/2104-2-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/2104-1-0x00000000002B0000-0x00000000002B6000-memory.dmp

          Filesize

          24KB

        • memory/2248-23-0x0000000000260000-0x0000000000266000-memory.dmp

          Filesize

          24KB