Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    13-02-2024 06:18

General

  • Target

    2024-02-13_e89684773dac8e44cb7877d898180ccc_cryptolocker.exe

  • Size

    32KB

  • MD5

    e89684773dac8e44cb7877d898180ccc

  • SHA1

    fc630ea8b83d82ed875630ac7166fb0e4ff2cab1

  • SHA256

    8fda2809fc48987b3ef38f9abb63301c8969e67668594d4632172bbf8b65cd46

  • SHA512

    d27987f629388bb09ddfb32122a7956c47690d149c447fd6d7e1f0e4f67527d32a2363a987f7bbf5fc61686d6b2c4e1f07130fea5690dd38beab75427d6e2ae1

  • SSDEEP

    384:bA74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUr766SJXTQke8S4N6:bA74zYcgT/Ekd0ryfjQRSNhpSx

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-13_e89684773dac8e44cb7877d898180ccc_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-13_e89684773dac8e44cb7877d898180ccc_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2620
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2316

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    32KB

    MD5

    89a8d4ed3c85a978138bd1bbcd125a94

    SHA1

    b66decd14ceac0528b4e9734fe0cd4556fcaa817

    SHA256

    b18847c1bda6a4886e8e990a6bc4eef2a7b071ff2f0540078f3145bb6037aca4

    SHA512

    2233ea474a02c9afab4172985ff18e34ce548431f77b2329ced066d6259e59f518e2f2339e36a7a1e28a9b796a4ff37a89d56f1512a33b1fc8529d18a15ff75c

  • memory/2316-16-0x00000000002A0000-0x00000000002A6000-memory.dmp

    Filesize

    24KB

  • memory/2316-15-0x0000000000200000-0x0000000000206000-memory.dmp

    Filesize

    24KB

  • memory/2620-0-0x0000000000490000-0x0000000000496000-memory.dmp

    Filesize

    24KB

  • memory/2620-1-0x00000000004C0000-0x00000000004C6000-memory.dmp

    Filesize

    24KB

  • memory/2620-2-0x0000000000490000-0x0000000000496000-memory.dmp

    Filesize

    24KB