Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    15-03-2024 13:49

General

  • Target

    2024-03-15_86e34f98aea29bd142b5660c5c288de0_cryptolocker.exe

  • Size

    385KB

  • MD5

    86e34f98aea29bd142b5660c5c288de0

  • SHA1

    0ba95e86bcac4bb0448b0a5c52e5d2959ceffff6

  • SHA256

    b4522c235424f4fc44c2bca2a10b6d973770f613e528fbf094896f3871bd41f3

  • SHA512

    76a3516d43bdda528dfd224840691b114d3603766c33e9f75520a81158e8cd8fe66dbb78091cfb753bf87301b2ea9e7cffac67f6f2546c8c290fa3358380716f

  • SSDEEP

    6144:nnOsaQgAOjvrZFODJjBz3j1jTqQy6v2GGnugOtihzXR:nnOflT/ZFIjBz3xjTxynGUOUhXR

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-15_86e34f98aea29bd142b5660c5c288de0_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-15_86e34f98aea29bd142b5660c5c288de0_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2856
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2336

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    386KB

    MD5

    f600aa985b9761f39fc218b9acd0d613

    SHA1

    f4909a4e5c7b584ce98124fbbca2442274a5c8dc

    SHA256

    469528ef64e23cb2197aff7001bcbe1179ee27442922fcc67527ba72080ab7e0

    SHA512

    f8588afa7778d8abd8c39f27fcfc63cabc432586b21909c4c07847f91acbadab64e09d72f0379f6f6d4c602f2eac061424f5806d5c2cb2a4ccc4a67e693da307

  • memory/2336-15-0x0000000001CB0000-0x0000000001CB6000-memory.dmp

    Filesize

    24KB

  • memory/2336-17-0x0000000000590000-0x0000000000596000-memory.dmp

    Filesize

    24KB

  • memory/2856-0-0x00000000004C0000-0x00000000004C6000-memory.dmp

    Filesize

    24KB

  • memory/2856-1-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/2856-3-0x00000000004C0000-0x00000000004C6000-memory.dmp

    Filesize

    24KB