Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    12/02/2024, 01:38

General

  • Target

    2024-02-12_6d5eb3f3b04d8da550d5ce27b8ab8534_cryptolocker.exe

  • Size

    33KB

  • MD5

    6d5eb3f3b04d8da550d5ce27b8ab8534

  • SHA1

    564f8c5ff3b21b5ce69bb0a69dd6e0b8a0797e58

  • SHA256

    f71538d60b13832f06d4718721a2dfd119855fdc4a774c8e3e37af9aeb03633f

  • SHA512

    28a1993b8359432c6bf1589ed67598e1f56038642b8272a45029252a77726a72206feb2ca838246e7384cf9605d05cb1797b9ac23173ac43059143941702038e

  • SSDEEP

    384:bmM0V/YPvnr801TRoUGPh4TKt6ATt1DqgPa3s/zzoCt9/B1RU3qvzb:b7o/2n1TCraU6GD1a4Xt9bRU6vf

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-12_6d5eb3f3b04d8da550d5ce27b8ab8534_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-12_6d5eb3f3b04d8da550d5ce27b8ab8534_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2248
    • C:\Users\Admin\AppData\Local\Temp\rewok.exe
      "C:\Users\Admin\AppData\Local\Temp\rewok.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2196

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\rewok.exe

          Filesize

          33KB

          MD5

          29621635c502cf2e8b8d8bbb86997bde

          SHA1

          83692da4d7cb83c5496c3795ecc99811e70090b4

          SHA256

          a4d601094ef356d8af9de4bad6773c033190bd3bb980b57a5815d14caeca0e8b

          SHA512

          c1a33a80a2747d09e27294d3e1e9dc8e1e3d8b181823b50672f29b2ca9042c5c7a58d24369e84f5b2f94ef462d53952f6cbbc9597ff6ab7fed69249be1b54bed

        • memory/2196-16-0x0000000000280000-0x0000000000286000-memory.dmp

          Filesize

          24KB

        • memory/2248-0-0x0000000000290000-0x0000000000296000-memory.dmp

          Filesize

          24KB

        • memory/2248-1-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/2248-6-0x0000000000290000-0x0000000000296000-memory.dmp

          Filesize

          24KB