Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    27/02/2024, 18:46

General

  • Target

    2024-02-27_a7c92a05b9641f6574aeda2763a5666a_cryptolocker.exe

  • Size

    48KB

  • MD5

    a7c92a05b9641f6574aeda2763a5666a

  • SHA1

    9e0f8d911ac12ffdce5cf2aaf10ff9f70175be2c

  • SHA256

    f85984217bffc436700037689de600b67e0593a2dfb9e676e5986bbf323de093

  • SHA512

    e8fba65d60eca6cbd4081459a656e2fa15ab2b1f582a6f13c3229b572857dbb2f4262af58b00ccff7bbab4379fe8fbff361cc20d6c0a95e7e5cdc681246f1c60

  • SSDEEP

    768:bgX4zYcgTEu6QOaryfjqDlC6JFbK37YbDu5z/hQcEp77:bgGYcA/53GAA6y37nbQB

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-27_a7c92a05b9641f6574aeda2763a5666a_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-27_a7c92a05b9641f6574aeda2763a5666a_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2328
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    48KB

    MD5

    916a15007ca74cc57817134bfd55fb0a

    SHA1

    5543868ed8b55472ce321227e9c2c17ec901d342

    SHA256

    ad7e4c51def9e36a5428d67f45307e4708ca0cc042b18159d4861cfb126bf4e2

    SHA512

    3cfc2423ac445421a3017176edcedb40fd883b2cfcad3a52cd0cb95f42190c7501bca45c2fe80a66f06918845eddd7a84fc5c41e85e5c5ef21a1ac9f28e47dd9

  • memory/2328-0-0x0000000002920000-0x0000000002926000-memory.dmp

    Filesize

    24KB

  • memory/2328-1-0x0000000002D00000-0x0000000002D06000-memory.dmp

    Filesize

    24KB

  • memory/2328-8-0x0000000002920000-0x0000000002926000-memory.dmp

    Filesize

    24KB

  • memory/2692-16-0x0000000000320000-0x0000000000326000-memory.dmp

    Filesize

    24KB

  • memory/2692-15-0x0000000000310000-0x0000000000316000-memory.dmp

    Filesize

    24KB