Analysis

  • max time kernel
    156s
  • max time network
    161s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29-02-2024 08:37

General

  • Target

    2024-02-29_60ac56d9be95310dc4dea9c046cf9ed8_cryptolocker.exe

  • Size

    47KB

  • MD5

    60ac56d9be95310dc4dea9c046cf9ed8

  • SHA1

    5dd18d0fc2d2550ff446454198f81cc3d035d312

  • SHA256

    648505004d164c0394cd7c931297d9eb26092c00a1550b67002debdafa47e0cb

  • SHA512

    960ff8931ebf57d0c16d420526398ea5dc217f2580e491873bd7ed1ca06e53c05d324d7d8045966e4fb78961b4f8f428744b581659120f6f25cf5c31d19f3f2f

  • SSDEEP

    768:bgX4zYcgTEu6QOaryfjqDlC6JFbK37YbDu5z/hvQku:bgGYcA/53GAA6y37nbU

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-29_60ac56d9be95310dc4dea9c046cf9ed8_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-29_60ac56d9be95310dc4dea9c046cf9ed8_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2976
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2852

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    47KB

    MD5

    ec252a1d73f22b0766b1f7dea4ba4282

    SHA1

    754afbe61374f38f1bcde33857ea4fa62a6bbadd

    SHA256

    dfb0e0ecc570dda646684af37fc9e1338f0d2474ca0f9b39ac2d929b6904ce36

    SHA512

    f635346cd10711640a4508692aac7b4c09780ae69d76423d0017906bd190c2cd86423743077ce38234c43b105132369c300b87adec257d2b798a7f0339999e41

  • memory/2852-15-0x0000000000410000-0x0000000000416000-memory.dmp

    Filesize

    24KB

  • memory/2852-17-0x00000000003E0000-0x00000000003E6000-memory.dmp

    Filesize

    24KB

  • memory/2976-0-0x00000000004A0000-0x00000000004A6000-memory.dmp

    Filesize

    24KB

  • memory/2976-1-0x00000000004C0000-0x00000000004C6000-memory.dmp

    Filesize

    24KB

  • memory/2976-7-0x00000000004A0000-0x00000000004A6000-memory.dmp

    Filesize

    24KB