Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24-02-2024 12:07

General

  • Target

    2024-02-24_fd158e07e6931ab0859eb3b8e4979640_cryptolocker.exe

  • Size

    41KB

  • MD5

    fd158e07e6931ab0859eb3b8e4979640

  • SHA1

    4ef9908ab1a30f3c25836e20b753169f3b398710

  • SHA256

    1a021fc7970c79acb4205ee3bfb1512e73229a9941f5c2510c4565ce0e34af5c

  • SHA512

    e5a39fe03706b04ec29c46e4b3c4b6a48bc7cd6c5e4010640f051d6894e0fb380db7d9ae706840af06f9cdfc39dbebed7f6e60b82e8b28200651734a78bc60d6

  • SSDEEP

    768:bgX4zYcgTEu6QOaryfjqDDw3sCu5b+rc5vVcFJ8K:bgGYcA/53GADw8ClrcTcFJ8K

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-24_fd158e07e6931ab0859eb3b8e4979640_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-24_fd158e07e6931ab0859eb3b8e4979640_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2980

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    41KB

    MD5

    a0bf0d6f5f1e344ad1151c2cdf1732fc

    SHA1

    4638c1c7b7a335905ab8a99035e8d63f4708e26c

    SHA256

    b8024db488cece1df4f6c5c09ca3e71fcaf75553fea8bcef3c9eeb38a28d6ba8

    SHA512

    989b57bee1076c5f360d21376c0eb96754a69e6d36e2e0e30bf9f143e9a311755d95e9f2267fd1fd6758bb1d5e7fb7770bd5b13fad9d11db5ac423ee3b8c716a

  • memory/2028-0-0x0000000000450000-0x0000000000456000-memory.dmp

    Filesize

    24KB

  • memory/2028-1-0x0000000000470000-0x0000000000476000-memory.dmp

    Filesize

    24KB

  • memory/2028-2-0x0000000000450000-0x0000000000456000-memory.dmp

    Filesize

    24KB

  • memory/2980-15-0x0000000001CA0000-0x0000000001CA6000-memory.dmp

    Filesize

    24KB

  • memory/2980-17-0x0000000001C80000-0x0000000001C86000-memory.dmp

    Filesize

    24KB