Analysis

  • max time kernel
    11s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29/02/2024, 06:10

General

  • Target

    2024-02-29_fe700762db9d13dfc9f694170a0c4d4b_cryptolocker.exe

  • Size

    35KB

  • MD5

    fe700762db9d13dfc9f694170a0c4d4b

  • SHA1

    5c71b17bb1d030404474e86fde8e927367250c57

  • SHA256

    71d720d128cbf315b2141fc4b8420d6d293d9a9796cabf5db7bee32cb454e2cb

  • SHA512

    8b896456c04bc90197a0213621b5ea00009623d64bbcd917f40939b68d9102d50b008b3279834f37e30260ab573c084cf9c5375aa80cb96ff321af714ada0452

  • SSDEEP

    384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSznHzu02lOQAs:b/yC4GyNM01GuQMNXw2PSjHC02ltAs

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-29_fe700762db9d13dfc9f694170a0c4d4b_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-29_fe700762db9d13dfc9f694170a0c4d4b_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1136
    • C:\Users\Admin\AppData\Local\Temp\retln.exe
      "C:\Users\Admin\AppData\Local\Temp\retln.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2300

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\retln.exe

          Filesize

          35KB

          MD5

          492da55e802a46e020bcd0b5281da16e

          SHA1

          cd72d0a9b9d6adeedd25b340ee5cfc01832447f7

          SHA256

          6363db911118eca33f2fcb4b1924e2fb9a069ba5c4a039f9287970a2fc6ce0dc

          SHA512

          99a46196e3571e865d3dbb844a27b03a43fc4f861affdff940ae751a35f5cd675cbece2effff70651e704da86fd6467e1729ad7fa01ba67839b0fc057c472c12

        • memory/1136-0-0x0000000000260000-0x0000000000266000-memory.dmp

          Filesize

          24KB

        • memory/1136-1-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/1136-2-0x0000000000260000-0x0000000000266000-memory.dmp

          Filesize

          24KB

        • memory/2300-17-0x0000000000370000-0x0000000000376000-memory.dmp

          Filesize

          24KB