Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    13-02-2024 18:42

General

  • Target

    2024-02-13_96a744ade6f0d21f59e1d0ed786b238d_cryptolocker.exe

  • Size

    37KB

  • MD5

    96a744ade6f0d21f59e1d0ed786b238d

  • SHA1

    deafc8b0a3684b7b7740744765cb52686e3331bd

  • SHA256

    a762310970591fc8f3ec3fd2b25028691e8aad5f484c887f770f606fde517a12

  • SHA512

    c537a1ad230afa13e80c218d7537636333001ba1f1ce5ce081eb5ea68fe1db176d39119aa7ee2680feaa4108afe4a5a20b06f923b3e673abafc674cfaccdd23a

  • SSDEEP

    384:bgX4uGLLQRcsdeQ7/nQu63Ag7YmecFanrlwfjDUkKDfWf0w3sp8u5cZr/0Q:bgX4zYcgTEu6QOaryfjqDDw3sCu5q/b

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-13_96a744ade6f0d21f59e1d0ed786b238d_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-13_96a744ade6f0d21f59e1d0ed786b238d_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3032
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2976

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    37KB

    MD5

    2a68b48f1e3a5cf5e1b1c9c17cb3d7ef

    SHA1

    66f3a075da1f4990ec544d4554798d9ae08c08b2

    SHA256

    268f17d3ff0b075e99bcdda1edd381e2b5d854ed05eaf71edeecfa980fef0550

    SHA512

    d3e9c7f40fdb7a187229daf4035a649ebdd249b0977baf9b8ca1ae87d94a3dfb4f06b4d15b49474cf5d26e370c0cbbf0fb60443befd8ff19589fed1ec67eea9e

  • memory/2976-15-0x0000000000470000-0x0000000000476000-memory.dmp

    Filesize

    24KB

  • memory/2976-18-0x0000000000450000-0x0000000000456000-memory.dmp

    Filesize

    24KB

  • memory/3032-0-0x0000000000260000-0x0000000000266000-memory.dmp

    Filesize

    24KB

  • memory/3032-1-0x0000000000260000-0x0000000000266000-memory.dmp

    Filesize

    24KB

  • memory/3032-2-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB