Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24/02/2024, 23:29

General

  • Target

    2024-02-24_a56cb80c92601a6fd5c0ff3c5ff61eb6_cryptolocker.exe

  • Size

    38KB

  • MD5

    a56cb80c92601a6fd5c0ff3c5ff61eb6

  • SHA1

    a69ba28c3fc8c8e368491d85af0ed22e132bfe1e

  • SHA256

    dedfb357ebc86f411656b2703a5a3599173b2214021200ffd31188bfe05acfe5

  • SHA512

    88535982624db6c9174734d3602f75932a0585b665dcbeebec36ee38419538aa811b0e200d357d876ce071afbed44b6a26d0915a6d11478e5c9ce1461902ba91

  • SSDEEP

    384:bgX4uGLLQRcsdeQ7/nQu63Ag7YmecFanrlwfjDUkKDfWf0w3sp8u5cZnfXE:bgX4zYcgTEu6QOaryfjqDDw3sCu5mXE

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
    "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
    1⤵
    • Executes dropped EXE
    PID:2716
  • C:\Users\Admin\AppData\Local\Temp\2024-02-24_a56cb80c92601a6fd5c0ff3c5ff61eb6_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-24_a56cb80c92601a6fd5c0ff3c5ff61eb6_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2244

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

          Filesize

          38KB

          MD5

          8aeee008a83db8d018b0614ea7ebbd82

          SHA1

          9f86d9ad07687a7c539da7e162fcbd1f8a253c37

          SHA256

          36f38a8bff6eac1b88aeb02bec5b94175e6fbe66ca038cc05b58d3bc334a458c

          SHA512

          7ef87af28b514473cbb0a6662462d16c0069f4a8079990433bfa852358c639e74d1b2dc67db3b489127a2368d4a350e57382822ef187a70e1a41ec6bc0867756

        • memory/2244-2-0x0000000000270000-0x0000000000276000-memory.dmp

          Filesize

          24KB

        • memory/2244-1-0x00000000002A0000-0x00000000002A6000-memory.dmp

          Filesize

          24KB

        • memory/2244-0-0x0000000000270000-0x0000000000276000-memory.dmp

          Filesize

          24KB

        • memory/2716-20-0x0000000000200000-0x0000000000206000-memory.dmp

          Filesize

          24KB