Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    14/03/2024, 23:26

General

  • Target

    2024-03-14_1ff6c606041a80e1f3a7ce9c5c3620f2_cryptolocker.exe

  • Size

    386KB

  • MD5

    1ff6c606041a80e1f3a7ce9c5c3620f2

  • SHA1

    f00045d236b8133d8661792f329f545157d81595

  • SHA256

    24b6b1cfd0dd281424f048ba2ae9fb7b840c04a101b880b289dee82517a215ae

  • SHA512

    029cd49e82ce7b4aa258623d3e8fae907ba30f982ba70d624ec3eb76d56721ceb85ac87c12e0997fe736d521a0939deb0d6454259af41bd13311d46dd59be8c5

  • SSDEEP

    6144:nnOsaQgAOjvrZFODJjBz3j1jTqQy6v2GGnugOtihzXj:nnOflT/ZFIjBz3xjTxynGUOUhXj

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-14_1ff6c606041a80e1f3a7ce9c5c3620f2_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-14_1ff6c606041a80e1f3a7ce9c5c3620f2_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2968
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2848

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\hasfj.exe

          Filesize

          387KB

          MD5

          97c56a744a6a59d78f83f389a6f4eeb6

          SHA1

          b9eed5bd37431c49ea98e18647c39a1e2953a4d3

          SHA256

          c36b31cf5cbb0ce01994ad88372c653e00c973d36d69139037c0b420cf4bc283

          SHA512

          5c9060cef9c5ee746ef55cd0700c90ec2a32d346d660b014561a05e9afc2d0a1e3103eee27ffbcc1e04811d04180bf2bc2b58e2bbeb665324526e3ec64b158d4

        • memory/2848-16-0x0000000000480000-0x0000000000486000-memory.dmp

          Filesize

          24KB

        • memory/2848-15-0x0000000000470000-0x0000000000476000-memory.dmp

          Filesize

          24KB

        • memory/2968-0-0x00000000002A0000-0x00000000002A6000-memory.dmp

          Filesize

          24KB

        • memory/2968-1-0x00000000002B0000-0x00000000002B6000-memory.dmp

          Filesize

          24KB

        • memory/2968-7-0x00000000002A0000-0x00000000002A6000-memory.dmp

          Filesize

          24KB