Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12-02-2024 19:52

General

  • Target

    2024-02-12_3015fa5251c07ad858bb953489ff1339_cryptolocker.exe

  • Size

    47KB

  • MD5

    3015fa5251c07ad858bb953489ff1339

  • SHA1

    f0905d6cf4eca7a9d864b5a67204b3de9dd1c88c

  • SHA256

    18cf787bea8880b8605e3083053bc7256eb254d14462eaf75bf05439a1b082b7

  • SHA512

    fea34b20c107c31c2c58b210e182a3e6bcdf80b804bd6755bae6c1580967c6c69cdd1d210f6b4a1a24238f6bbeb8885d12c3a2474a51f0213588f09b1a6dd5b3

  • SSDEEP

    768:bgX4zYcgTEu6QOaryfjqDlC6JFbK37YbDu5z/hDx:bgGYcA/53GAA6y37nbF

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-12_3015fa5251c07ad858bb953489ff1339_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-12_3015fa5251c07ad858bb953489ff1339_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1972
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    47KB

    MD5

    8b03c3ec95c9e4ce59359a69f0756d58

    SHA1

    20830c13e1e2121d0d1fc5032cf934f019f1ae6d

    SHA256

    7a256badcde0fce3a10e90374a2dfcd343ecd00def5cde05cc921ab844fcd4af

    SHA512

    d9eb5b5885b7307973093b9c7355512b1109a051cea6e3de976757ef00b72e5f8e26f9cf41315ab8f5ad3c8f34156175dd1ed3d6b4f295c676fc73b4db8ff3f6

  • memory/1972-0-0x00000000003B0000-0x00000000003B6000-memory.dmp

    Filesize

    24KB

  • memory/1972-1-0x00000000003B0000-0x00000000003B6000-memory.dmp

    Filesize

    24KB

  • memory/1972-2-0x00000000003D0000-0x00000000003D6000-memory.dmp

    Filesize

    24KB

  • memory/2828-15-0x0000000000410000-0x0000000000416000-memory.dmp

    Filesize

    24KB

  • memory/2828-18-0x0000000000270000-0x0000000000276000-memory.dmp

    Filesize

    24KB