Analysis

  • max time kernel
    132s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25/02/2024, 17:38

General

  • Target

    2024-02-25_803d6bf89f95e361c64b2cea95095b4a_cryptolocker.exe

  • Size

    42KB

  • MD5

    803d6bf89f95e361c64b2cea95095b4a

  • SHA1

    8e6b16b9ea67b61267c87e9134219a2d139dcbc7

  • SHA256

    1f45a1c8a43efbeb1db2918ecab2cb26a67ae010092a9bb2190617cb54e1d10d

  • SHA512

    75a509ccddaed94d789a0db336768328119094f77bafddbfcbc37aaefd02cdf7d91fe1dd63430719383e57cc3bc915c161eba863bbacb9fba0ff344a83fb2164

  • SSDEEP

    768:b7o/2n1TCraU6GD1a4X0WcO+wMVm+slAMphej/W:bc/y2lkF0+Ber

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-25_803d6bf89f95e361c64b2cea95095b4a_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-25_803d6bf89f95e361c64b2cea95095b4a_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Users\Admin\AppData\Local\Temp\rewok.exe
      "C:\Users\Admin\AppData\Local\Temp\rewok.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:1284

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\rewok.exe

          Filesize

          42KB

          MD5

          9cfc3c45827539cd679f1fed306ee058

          SHA1

          efacc96afe28933587c93ccda6dc5949b176ebe3

          SHA256

          165ce80dfc42e081b038d24475af85bc0527409ec87979e1d5b6d5ffa8dabc53

          SHA512

          51923e91b42e04bcfbf1b9433d965b15c46c40003e876b151e3f0b769cfe7e660b6e6df168fed5f7a39de29f1975720db48c8d4becf69a22616eedbd05f77c09

        • memory/1284-17-0x0000000000310000-0x0000000000316000-memory.dmp

          Filesize

          24KB

        • memory/1736-0-0x00000000004F0000-0x00000000004F6000-memory.dmp

          Filesize

          24KB

        • memory/1736-2-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/1736-1-0x00000000004F0000-0x00000000004F6000-memory.dmp

          Filesize

          24KB