Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    04/02/2024, 08:25

General

  • Target

    2024-02-04_4074d80b3d01f136b2f43c17f1ac3258_cryptolocker.exe

  • Size

    31KB

  • MD5

    4074d80b3d01f136b2f43c17f1ac3258

  • SHA1

    19edcf466813d5506bca0f45eaa23da8788d1194

  • SHA256

    7fca62ab29f0de4a2f4f86ddef066bcc6bc2aa5faf8f766f4c08f31ae1dd580e

  • SHA512

    991b1b13c56375318d5e744afaf92f9c348fa5fb2f24428e2f8711f9d3995363a4627d340aeb0519d01fb0f5079b392a34bdc8d50123bfd4aec63aa8579ad59b

  • SSDEEP

    384:bAvMaNGh4z7CG3POOvbRSLoF/F0QU5XYFnufc/zzo6cuM9gH:bAvJCYOOvbRPDEgXRcuM9gH

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-04_4074d80b3d01f136b2f43c17f1ac3258_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-04_4074d80b3d01f136b2f43c17f1ac3258_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3040
    • C:\Users\Admin\AppData\Local\Temp\demka.exe
      "C:\Users\Admin\AppData\Local\Temp\demka.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:1872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    36KB

    MD5

    2da87d76d3e5fa4b6c32cd605644f168

    SHA1

    5c1c3104e54f3fafae2021d764e8dfec2bfd329b

    SHA256

    d37376ead5b9c5947f7ec23f9f18333e50f0041838e20b3328c25a0665b9c53a

    SHA512

    57cf5bc5c9f5f3f8f3f7fe21fcb63edba2dd6e1e7b0125fcf8e9d898c369d8ead438b4e437272cf0e0aa24aa832979e629d3dd25d1d076b6733b640b56808242

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    333c33eaf672e87a2f5575108c4a867a

    SHA1

    0caf7acc85e117af0f9bd7f2b04bd795575342ee

    SHA256

    b9e9169acf2af2d1ad165f1eed4b00387602c99520ed5d7a1e4009779f03cafe

    SHA512

    253c996355b7c877db205f3221ee21eb5b6cdbf9d7c9d353cac25454165b261dcec280937f740869c58ff05319ddbbb5dd46665c96ee46dbb48402ccde0575ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    314bb928f49f35b0c43962d8130d6e53

    SHA1

    56ada39f12f7ce09d571c24bb6b93416472207db

    SHA256

    31fb4b9b800c86a17fb0204be18e84e0b8fed28cc07dd690699c9825ed5ba4fc

    SHA512

    ea5424fc3e9296159282ad6a1508fe5b21dc037b2960d2c0d8bd8760f175ee191d74445ff65034bd6de2a8228f27ab0a3e92bc3f54ebf277231f6de8a4575474

  • C:\Users\Admin\AppData\Local\Temp\TarE0A.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Local\Temp\demka.exe

    Filesize

    31KB

    MD5

    8129444b4b29224ef4f3ea433fb87bf3

    SHA1

    5858ef795d086f5b86b2e0712129372b3c5795bd

    SHA256

    793fb28901e78c8ebb66499ba1d9a132ae84f49fb3fdb31d3604c208f7023072

    SHA512

    e75c52d4ea6b277e9d5c437e821cadb2e0387c4411213645679bd68bf117121787e62d1ef2d8c6a56b016f430b88ba793ab779bcbc1daa5f9a99fc58533911c8

  • memory/1872-22-0x0000000000410000-0x0000000000416000-memory.dmp

    Filesize

    24KB

  • memory/3040-8-0x0000000000300000-0x0000000000306000-memory.dmp

    Filesize

    24KB

  • memory/3040-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/3040-0-0x0000000000300000-0x0000000000306000-memory.dmp

    Filesize

    24KB