Analysis

  • max time kernel
    14s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    04/02/2024, 03:53

General

  • Target

    2024-02-04_b8a4ed29002a0e6556f99c07d6cb715b_cryptolocker.exe

  • Size

    33KB

  • MD5

    b8a4ed29002a0e6556f99c07d6cb715b

  • SHA1

    e80648e0b1e44741fa355b60fe66357052c9a907

  • SHA256

    5fe8605fab56e87395ed9c98219aa5a18b333024dcb6675e7a9ec22ad15039fc

  • SHA512

    b6051435a3638f3d1203811c5e4ba84b0dea33500173ef62b62b3e738ffbb6807328a63399956dee0b6a0b84fd039bcbd8957466a061d35b2a1615a036413cae

  • SSDEEP

    384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSznHzl6A0X/EIG:b/yC4GyNM01GuQMNXw2PSjH+PS

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-04_b8a4ed29002a0e6556f99c07d6cb715b_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-04_b8a4ed29002a0e6556f99c07d6cb715b_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1016
    • C:\Users\Admin\AppData\Local\Temp\retln.exe
      "C:\Users\Admin\AppData\Local\Temp\retln.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2388

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\retln.exe

          Filesize

          33KB

          MD5

          20c17fc3b86d8335f93101dac65cf277

          SHA1

          6eeb0d87fdf6f0ce8169904dce9fd414e6e84098

          SHA256

          aeab4f8d4bdc8ec267e1cee95d7be22c027433633c17bc87e84adab0547607aa

          SHA512

          e387c17e6c0806b1f1933ee0515aa5831daf41c55870fee5a39f74266343a680be4ed7611a0796128b5ca6b0a5dee064fa9bbe414635ba3e435025cfe5ff6451

        • memory/1016-0-0x00000000002F0000-0x00000000002F6000-memory.dmp

          Filesize

          24KB

        • memory/1016-1-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/1016-2-0x00000000002F0000-0x00000000002F6000-memory.dmp

          Filesize

          24KB

        • memory/2388-18-0x0000000000340000-0x0000000000346000-memory.dmp

          Filesize

          24KB