Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    26/03/2024, 22:43

General

  • Target

    2024-03-26_df7f4309cdfa9e94131c97d9d6a5863b_cryptolocker.exe

  • Size

    387KB

  • MD5

    df7f4309cdfa9e94131c97d9d6a5863b

  • SHA1

    9a61df779ef47a343714b42937c947b11b421210

  • SHA256

    2fcc9bc09b22d1206f8b6d118147c609b8856fed64fb220e7cdfaa5ae33bcab3

  • SHA512

    1585216b240b3ea96b763de33d643cb42f0fdc4735feee9185a9b8b0ed497f8d9a883448ffc0e3c533aaad8099de7640ccdd8873d3448a2914a51261b51033df

  • SSDEEP

    6144:nnOsaQgAOjvrZFODJjBz3j1jTqQy6v2GGnugOtihzXK:nnOflT/ZFIjBz3xjTxynGUOUhXK

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-26_df7f4309cdfa9e94131c97d9d6a5863b_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-26_df7f4309cdfa9e94131c97d9d6a5863b_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1660
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2932

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\hasfj.exe

          Filesize

          387KB

          MD5

          de97ebabbab233b19a2a78254db9607b

          SHA1

          b2f282e5383eb3770f01214400c218da28c85fa0

          SHA256

          27c335b652dcc8f18e2b67ef409fb2b9c8e634daa5e855fdf39a1d06695175cf

          SHA512

          86da258aeb88be07a572df403b0c471181b4d255030b725ef83557151ece0ea9c96d42154711362c66248c6b7f2dd343be391dc4171a0e39c59abecbcd6327cd

        • memory/1660-0-0x0000000000450000-0x0000000000456000-memory.dmp

          Filesize

          24KB

        • memory/1660-1-0x0000000000460000-0x0000000000466000-memory.dmp

          Filesize

          24KB

        • memory/1660-7-0x0000000000450000-0x0000000000456000-memory.dmp

          Filesize

          24KB

        • memory/2932-15-0x0000000000710000-0x0000000000716000-memory.dmp

          Filesize

          24KB

        • memory/2932-16-0x0000000000470000-0x0000000000476000-memory.dmp

          Filesize

          24KB