Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28/02/2024, 15:50

General

  • Target

    2024-02-28_855e07381e5b1d94f0b49e2852969311_cryptolocker.exe

  • Size

    38KB

  • MD5

    855e07381e5b1d94f0b49e2852969311

  • SHA1

    c20f4e89883ec6ba2051a403540b27990246e1fe

  • SHA256

    9b08d98cb6d28ba1732218acedbf02c525a701bcda006a7251eb4faaac849cef

  • SHA512

    c1e2737d1c671790b8391171c09210490a1df3c05b4219457bdc2d02bedeb4564d1fc2a08e756a1f60169995564ea95f8ab2dbaf350cb606913ae6d64f1763d9

  • SSDEEP

    768:bAvJCYOOvbRPDEgXrNekd7l94i3pF04cXRP15d:bAvJCF+RQgJeab4sFuXRp

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-28_855e07381e5b1d94f0b49e2852969311_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-28_855e07381e5b1d94f0b49e2852969311_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2752
    • C:\Users\Admin\AppData\Local\Temp\demka.exe
      "C:\Users\Admin\AppData\Local\Temp\demka.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2184

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          67KB

          MD5

          753df6889fd7410a2e9fe333da83a429

          SHA1

          3c425f16e8267186061dd48ac1c77c122962456e

          SHA256

          b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

          SHA512

          9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          16f946f8670e0f2400c8dd2d589f2c8c

          SHA1

          2c0d829189352203145090f94208949c4913ea06

          SHA256

          e3617671f1724bd5c723587bf343f127af0901e2977aca752bfa9669dc60b766

          SHA512

          caf5b20f99a61e823994174f4cb769cc04faf5e821491a93a1a553252871d807c73ce086023f69925738772209d6d6e9cf5f41a697a25a948a7f9405e324303a

        • C:\Users\Admin\AppData\Local\Temp\Cab2FF8.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Tar31B4.tmp

          Filesize

          64KB

          MD5

          820a06ef8c892b0a1b1fd98d6e4eace7

          SHA1

          416685d619c254adb4609aa7cd63437d27917102

          SHA256

          bfe2cde9f596db37dd37deab1c8f26a244dcd156de6d268a7e3292496ccacfba

          SHA512

          04fa93cafe4b6ea3fa9afa9c79a30206cb994433b7efceb3aaba611f104a67e856cf6d981083b90584718f5cdea7bed07d3c0541b8d5d3c3f141ac6480a38d1a

        • \Users\Admin\AppData\Local\Temp\demka.exe

          Filesize

          39KB

          MD5

          d26a5bd9cd39a74a2e24c57ed7bd0d1c

          SHA1

          5a0488c5943e9758232d1fd2f0968003b792c484

          SHA256

          a6d6171b7ace1ec6d70e0789892883ab12f65e983b5226c653bc876a7c04d400

          SHA512

          7c2b5c2570afbb9c590b8b567131015cc9d3e2759420df9f964e221e3d40ca6213293de3827d410cbea5e9f9719c85ede3f2403564e225dbbc231ff49cb0ea44

        • memory/2184-19-0x00000000003D0000-0x00000000003D6000-memory.dmp

          Filesize

          24KB

        • memory/2752-0-0x00000000005C0000-0x00000000005C6000-memory.dmp

          Filesize

          24KB

        • memory/2752-1-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/2752-8-0x00000000005C0000-0x00000000005C6000-memory.dmp

          Filesize

          24KB