Analysis

  • max time kernel
    119s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29-02-2024 00:57

General

  • Target

    2024-02-29_e72b5bd884e71b41df663304f0e4c5bd_cryptolocker.exe

  • Size

    40KB

  • MD5

    e72b5bd884e71b41df663304f0e4c5bd

  • SHA1

    ba017c9c6e67ad137749ab364cd8583f2d2e0518

  • SHA256

    0dcb6900a6b351ab847ac83dd756fe22e69a6030794517df5e1a6d3c1f8fa4d6

  • SHA512

    19b59f21f20a0a5d3853b63760e44720853a36a20665a6608b60896b65abb93bd656e96c90d3f21926e42e269a07920c61074c0c021fd6e99f24d7a0c6011112

  • SSDEEP

    768:bAvJCYOOvbRPDEgXrNekd7l94i3py/yY/m:bAvJCF+RQgJeab4sy/lm

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-29_e72b5bd884e71b41df663304f0e4c5bd_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-29_e72b5bd884e71b41df663304f0e4c5bd_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2804
    • C:\Users\Admin\AppData\Local\Temp\demka.exe
      "C:\Users\Admin\AppData\Local\Temp\demka.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    38KB

    MD5

    38555df0e0feab34d636b41fcc4273f5

    SHA1

    a1ccaa04d1fa7e448c9d5e7d7e6cfcfe402c9b7d

    SHA256

    597ecccb5f95dbd1932737340ed9e9feca04185493bb2c1b7c82cc6bb9b0b906

    SHA512

    b610176c2948b614c875e01da826787e5c71dd062744f241bc5c3a6b4438c9c96ae7d2cfc8d120c910821f1273a43f7a9c52cc2b9bfbb86d5938968d5d909ef7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4ed9729ca35b22d3e8ca2d83997033a6

    SHA1

    75d4e00a1ba7a170f154a93aeb6e66fd48302885

    SHA256

    9289c458bb81705db4232f47bbdb55e4b3dea3b7898df0d87e5378e15365a3c7

    SHA512

    eb636d0f2b0a21be1d7e53ec61dd76c94f85619d04892ef78e1e4a469cda4984ebcf2ede77a63207352237391c2c248941aa882884fd356011781890c1f0cfc5

  • C:\Users\Admin\AppData\Local\Temp\Cab5D00.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar5F1A.tmp

    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

  • \Users\Admin\AppData\Local\Temp\demka.exe

    Filesize

    40KB

    MD5

    22dc6ccbfb470ea965c740fbc0205438

    SHA1

    f96d73f6ae1622c22a5f843d6966da8b0fddba79

    SHA256

    ac3942a2f1e2067984edcdb157a9f7a12d4fd4ba3ccaaea0e0d690e4086b139b

    SHA512

    a841ffb8ff31bf6e10835515ea4c6b009c9ff62967a38a09e68c11e07dc14f17149803c7c84fa63f09be341822f4d5a0822dca3dab4ad3a225108858199bfb64

  • memory/2664-21-0x0000000000270000-0x0000000000276000-memory.dmp

    Filesize

    24KB

  • memory/2804-0-0x00000000002F0000-0x00000000002F6000-memory.dmp

    Filesize

    24KB

  • memory/2804-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2804-4-0x00000000002F0000-0x00000000002F6000-memory.dmp

    Filesize

    24KB