Analysis

  • max time kernel
    3s
  • max time network
    71s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    14/03/2024, 08:37

General

  • Target

    2024-03-14_61f3d6546ea0fb154ab5cc9da945c7ed_cryptolocker.exe

  • Size

    41KB

  • MD5

    61f3d6546ea0fb154ab5cc9da945c7ed

  • SHA1

    376460e977a712b675573b4006bc0fdcb15740cb

  • SHA256

    7ee88337c85d2332da3fe1b1aaab8f2593cfb3d08afddef49a4e483895f38618

  • SHA512

    86cae49ab161a26df6cd636f16a5af6e0721401967a788979015f90fcdca7fcf1817666c343c7bf4021efc6c911b522720d9359e10cad158ec7c5d85218da543

  • SSDEEP

    768:b/yC4GyNM01GuQMNXw2PSjHPbSuYlW8PA9Do:b/pYayGig5HjS3NPA9Do

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-14_61f3d6546ea0fb154ab5cc9da945c7ed_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-14_61f3d6546ea0fb154ab5cc9da945c7ed_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Users\Admin\AppData\Local\Temp\retln.exe
      "C:\Users\Admin\AppData\Local\Temp\retln.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\retln.exe

    Filesize

    42KB

    MD5

    3ae515e8074afdc7aeb75474cf36acda

    SHA1

    3f1e36d366e1b7e9502ed725539183ec247e909b

    SHA256

    c452d996d90b3bcc1ae00a647a4486dcf471c6fca8d20ab023df0ec91708fb06

    SHA512

    08777b2694618efb769298c219cd0deb2c0a1218b3c8843cd66fa98a35c34fe205c180e3c55746ee40e9c21af4dce63e1d2f3ce0a7758a1fd0c32cf62424f0e1

  • memory/2084-0-0x0000000000290000-0x0000000000296000-memory.dmp

    Filesize

    24KB

  • memory/2084-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2084-8-0x0000000000290000-0x0000000000296000-memory.dmp

    Filesize

    24KB

  • memory/2540-23-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB