Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    21-02-2024 23:30

General

  • Target

    2024-02-21_cb27ba7eb740b5a53b9cb7ca13e0335f_cryptolocker.exe

  • Size

    49KB

  • MD5

    cb27ba7eb740b5a53b9cb7ca13e0335f

  • SHA1

    48e0e4e476e7a806e3fe9542670dadd6c4b5c749

  • SHA256

    b87b9d06d6724a5b7f4d504df2b3d034324b543e16e50ac8ed593c1d6c6d002e

  • SHA512

    376886ba4e9493a72c05bb9b592c2888ca74325cf5f0867571dbe9bce00761278ec4f22487f6e5929ef0815730f8ebe00364b44c51eb99961401d2bf8e277d56

  • SSDEEP

    768:bgX4zYcgTEu6QOaryfjqDlC6JFbK37Yl6dIKld5CSy:bgGYcA/53GAA6y37Q6dI+d5q

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-21_cb27ba7eb740b5a53b9cb7ca13e0335f_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-21_cb27ba7eb740b5a53b9cb7ca13e0335f_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1624
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2932

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    49KB

    MD5

    39fbc046cb191856707ce74be76ecb01

    SHA1

    7154022248c078761a82f32f6a0681038ce1c257

    SHA256

    ee069b6f4a0a77ec3b02a7a4836061f2773092e5df8bc3c4e5c4d0ace26b082f

    SHA512

    0530cd5970c28c75325b639ef7cbe993126952158b0155bbe253eeae4a0205a92fa063d64826f61b20764c831b3292e06374a78e690bb7d59d5eced45137debc

  • memory/1624-0-0x00000000002F0000-0x00000000002F6000-memory.dmp

    Filesize

    24KB

  • memory/1624-1-0x0000000000470000-0x0000000000476000-memory.dmp

    Filesize

    24KB

  • memory/1624-5-0x00000000002F0000-0x00000000002F6000-memory.dmp

    Filesize

    24KB

  • memory/2932-15-0x0000000001CA0000-0x0000000001CA6000-memory.dmp

    Filesize

    24KB

  • memory/2932-16-0x00000000005F0000-0x00000000005F6000-memory.dmp

    Filesize

    24KB