Analysis

  • max time kernel
    151s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    12-03-2024 05:03

General

  • Target

    2024-03-12_ffacfe707f6f40655726d3ea9edc56c4_cryptolocker.exe

  • Size

    386KB

  • MD5

    ffacfe707f6f40655726d3ea9edc56c4

  • SHA1

    2e6ebe48fb1a2f487e000933abe2369c74cf1a72

  • SHA256

    9506bec130dd8abdc4b3142ccbb9ca36c9c0191a2863974ae286177aa5a1002e

  • SHA512

    3ba0ca52534cbd8a85bdc8ae9eb9f81b6ae70977c7f1459935a076fb10c1c414018c9a5314e9d00bb2368d9f705ec356320beb14e6a9d210cac9c93aca3e80d0

  • SSDEEP

    6144:nnOsaQgAOjvrZFODJjBz3j1jTqQy6v2GGnugOtihzXI:nnOflT/ZFIjBz3xjTxynGUOUhXI

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-12_ffacfe707f6f40655726d3ea9edc56c4_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-12_ffacfe707f6f40655726d3ea9edc56c4_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2176
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    386KB

    MD5

    53e39e187c062e3e68ceb57b75ed7986

    SHA1

    751ce5c43586a1c7e4941e0d8b236c85ff99906e

    SHA256

    da1e0e017e568a3d59632d384926a376ae02bf74f3286d231c6ecf57cb1ca614

    SHA512

    8df991b62c4df0d0d9a5b8c43ae48c6b3bdedc9ec02022ec70b8fe6676a7cecb82d646655a10e5c27f36165d6340defe2a20cc77656d2b78c24ba0679bf6f8e8

  • memory/2176-0-0x00000000002F0000-0x00000000002F6000-memory.dmp

    Filesize

    24KB

  • memory/2176-2-0x0000000000350000-0x0000000000356000-memory.dmp

    Filesize

    24KB

  • memory/2176-1-0x00000000002F0000-0x00000000002F6000-memory.dmp

    Filesize

    24KB

  • memory/2516-16-0x0000000001CA0000-0x0000000001CA6000-memory.dmp

    Filesize

    24KB

  • memory/2516-15-0x0000000001C80000-0x0000000001C86000-memory.dmp

    Filesize

    24KB