Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    12/03/2024, 21:33

General

  • Target

    2024-03-12_7ceb21fde37950624a2d281ef1066945_cryptolocker.exe

  • Size

    33KB

  • MD5

    7ceb21fde37950624a2d281ef1066945

  • SHA1

    8fb85a9885f787e4cbe2e49b04a0d7181e86a8a4

  • SHA256

    40bdc7b88c64758cea6a0c1b2b00d24d95acb259f64e0c3ca3c525d82def063d

  • SHA512

    ed8ba115523afeb9bca0f1bf02313c6e39cd9072f8df4da2cfa5722097f610a51828082d77f0c96a88ac5614a47af28b5673d007118f6e47a95b62a17157049c

  • SSDEEP

    384:bA74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUgIunexRlz5Kg1Gwx5W:bA74zYcgT/Ekd0ryfjPIunYHK2W

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-12_7ceb21fde37950624a2d281ef1066945_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-12_7ceb21fde37950624a2d281ef1066945_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:3008

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\hasfj.exe

          Filesize

          33KB

          MD5

          20b5df491ec450a776613aec05bc6143

          SHA1

          a361c86d1038ed818cdb27ad218dc5c373de37fb

          SHA256

          6c215f751f4c6de8b281e9c9d06a6985cfbe87e3efd0ba51c49f36a9cc10884c

          SHA512

          1a25d7634bb9847fae072fc297b9b00eebebef9e2e85e410bda6a4b36ce9cd7cbc20606a3b3760cbb0406d708ac9c988487897c48d52d37c4ee941792a333cfd

        • memory/2368-0-0x0000000000320000-0x0000000000326000-memory.dmp

          Filesize

          24KB

        • memory/2368-1-0x0000000000330000-0x0000000000336000-memory.dmp

          Filesize

          24KB

        • memory/2368-8-0x0000000000320000-0x0000000000326000-memory.dmp

          Filesize

          24KB

        • memory/3008-15-0x0000000000390000-0x0000000000396000-memory.dmp

          Filesize

          24KB

        • memory/3008-22-0x0000000000380000-0x0000000000386000-memory.dmp

          Filesize

          24KB