Analysis

  • max time kernel
    13s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    13/02/2024, 19:31

General

  • Target

    2024-02-13_4b702b8468c3892b8743f8f15ea59124_cryptolocker.exe

  • Size

    39KB

  • MD5

    4b702b8468c3892b8743f8f15ea59124

  • SHA1

    7895319b0b2aaedc40599a8abbd5a581d13c6e85

  • SHA256

    d69367d3c0b9a2e7cf83a8dc1c6b34d8b38f9eb75e329439dae098249190d787

  • SHA512

    0f6320989719e9e67a96db071c5d32c053876e5ebb12eed82fd96cda4e377cbb1c175b8f7d20953c3e5dc055659a69c469a3dd395892385c41ab4323bfb1b215

  • SSDEEP

    384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSznHzl6AJvDSuYlxuj0:b/yC4GyNM01GuQMNXw2PSjHPbSuYla0

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-13_4b702b8468c3892b8743f8f15ea59124_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-13_4b702b8468c3892b8743f8f15ea59124_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2120
    • C:\Users\Admin\AppData\Local\Temp\retln.exe
      "C:\Users\Admin\AppData\Local\Temp\retln.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2848

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\retln.exe

          Filesize

          39KB

          MD5

          7d96b45af4541eab69cfd2440b7ef369

          SHA1

          c230b305cec6c6678ece6aa05cf1ab0abc8639dc

          SHA256

          eb95bcb0bab96ad27d045d4925006af093991ca3ee8d0f3d3db899cf9b8c2e93

          SHA512

          9b2ee4aa4d3265b90d2fa68ae85c813fd94fde7f51f1fce5a23e10c52875447c47bccaa53045bff0b5535fb0850900d0941e8fa828803793e0be4e37822049a1

        • memory/2120-0-0x0000000000390000-0x0000000000396000-memory.dmp

          Filesize

          24KB

        • memory/2120-1-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/2120-2-0x0000000000390000-0x0000000000396000-memory.dmp

          Filesize

          24KB

        • memory/2848-23-0x0000000000360000-0x0000000000366000-memory.dmp

          Filesize

          24KB