Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    20/02/2024, 21:44

General

  • Target

    2024-02-20_c6279a6c94a674ba24026bdc1ea4ccd9_cryptolocker.exe

  • Size

    42KB

  • MD5

    c6279a6c94a674ba24026bdc1ea4ccd9

  • SHA1

    ed39c129cf36c57b751e91f04c681890f0bcf08a

  • SHA256

    9d1b6ba2432d937ae94a0f82d3960d24c0b98c06e987fe5fe44e9f3227f23a00

  • SHA512

    7180caf66a519a2214e9aaf3926d63d983d2047dd1eaa35ffc393b6251c7d9e02a917cd695a66d530711f150f67c3dcab33c3c4370036d69b3fc560c0af17ea6

  • SSDEEP

    768:bgX4zYcgTEu6QOaryfjqDDw3sCu5b+syI:bgGYcA/53GADw8Cl/I

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-20_c6279a6c94a674ba24026bdc1ea4ccd9_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-20_c6279a6c94a674ba24026bdc1ea4ccd9_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2528
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2492

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\hasfj.exe

          Filesize

          42KB

          MD5

          f1708ef010b960fff1431a684f5552ef

          SHA1

          648cc6d4ee6c5a97ed16b6d947eb6a4abb804300

          SHA256

          dad83a2907541c7f4a2b00bcee91ce327ae1793ce64d93ad7c35d22a1f07bcd1

          SHA512

          f3e89811d2805f3a0e3222c8e8248963780fb51d6ccdf0b3210c54c9803f186be772cebe15fc29d0323f9475a843274109d5860e01261373eb307226689cf5cf

        • memory/2492-15-0x0000000000290000-0x0000000000296000-memory.dmp

          Filesize

          24KB

        • memory/2492-18-0x0000000000270000-0x0000000000276000-memory.dmp

          Filesize

          24KB

        • memory/2528-0-0x0000000000330000-0x0000000000336000-memory.dmp

          Filesize

          24KB

        • memory/2528-2-0x0000000000330000-0x0000000000336000-memory.dmp

          Filesize

          24KB

        • memory/2528-1-0x0000000000350000-0x0000000000356000-memory.dmp

          Filesize

          24KB