Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    18-03-2024 18:55

General

  • Target

    2024-03-18_863fdfdde9b913c4c618dd04103ba6c1_cryptolocker.exe

  • Size

    385KB

  • MD5

    863fdfdde9b913c4c618dd04103ba6c1

  • SHA1

    4ffc368b1f8ab9ae9f571a9522fb72c7f353f046

  • SHA256

    9d897c9b8372e2ecd26226413a11e3ffb092a863c2da06a606f61572b0dd6474

  • SHA512

    5d1b4e995c198cd1d84e4d92223e9a049a9499285f070f4438bdcb40a12af2743c2ebacdfe31e34424952f30271cf60a7a52b059b687a5195afb8da492b73034

  • SSDEEP

    6144:nnOsaQgAOjvrZFODJjBz3j1jTqQy6v2GGnugOtihzX2:nnOflT/ZFIjBz3xjTxynGUOUhX2

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-18_863fdfdde9b913c4c618dd04103ba6c1_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-18_863fdfdde9b913c4c618dd04103ba6c1_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2112
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    386KB

    MD5

    69a431281c5827da48ffd16bd09409fa

    SHA1

    5d7cfa2ac7ef05117bc1718a872457321a8e8aea

    SHA256

    6dab12d480a270b5399140179b9ed89e594eab669d1c2ce723c50cab1ffbd799

    SHA512

    1a53de1e3f567761c988c11e75eaf77970dd114041ca35372efd9e1934f8fc5ec2b1749c07df46a4389547471d3b17ce7443170039365a9038331997af977f88

  • memory/2112-0-0x0000000000390000-0x0000000000396000-memory.dmp

    Filesize

    24KB

  • memory/2112-1-0x00000000003B0000-0x00000000003B6000-memory.dmp

    Filesize

    24KB

  • memory/2112-8-0x0000000000390000-0x0000000000396000-memory.dmp

    Filesize

    24KB

  • memory/2644-15-0x0000000000580000-0x0000000000586000-memory.dmp

    Filesize

    24KB

  • memory/2644-22-0x0000000000570000-0x0000000000576000-memory.dmp

    Filesize

    24KB