Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    26/03/2024, 23:47

General

  • Target

    2024-03-26_b3b374d924d026ef0aa83e2a9859556c_cryptolocker.exe

  • Size

    33KB

  • MD5

    b3b374d924d026ef0aa83e2a9859556c

  • SHA1

    4354ae36f6d8ad42c4258dc039bfcf33e8a792cf

  • SHA256

    86571e3a12f4369c32db5c276d245d10533f0d27a3125d5f20fac5de6bdb7db7

  • SHA512

    885b0d5a3f513ecd84c3d0e2cfaa67ac1527f90434cef89886a1bce4e6144e66ccd4ba51663f2bcd2df354d20a0b6bfa2096829f5b0403eb0948423c37a7ed4b

  • SSDEEP

    384:bA74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUgIunvsYo83:bA74zYcgT/Ekd0ryfjPIunvsi3

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-26_b3b374d924d026ef0aa83e2a9859556c_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-26_b3b374d924d026ef0aa83e2a9859556c_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:1744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    33KB

    MD5

    9f7d3b03d73a42f29e70d3ce0a4657d7

    SHA1

    dcbbf814cdbb533878e393c12d67e44e3432ba51

    SHA256

    c11c038bf6bf7c61f89d9b3e8cf2510143fadfedd7c60121424d7c709bd78a0b

    SHA512

    6c4bfb5dfce4a195c23c0dff70fc02b8ff59e9c02c9e95442e2e280dc445d2e3df8f41daf5ce0ea415d32c4150750ad9669268153b151afab82d0e6c8774f38c

  • memory/1744-15-0x00000000004A0000-0x00000000004A6000-memory.dmp

    Filesize

    24KB

  • memory/1744-22-0x0000000000310000-0x0000000000316000-memory.dmp

    Filesize

    24KB

  • memory/2372-0-0x0000000001CE0000-0x0000000001CE6000-memory.dmp

    Filesize

    24KB

  • memory/2372-1-0x0000000002D00000-0x0000000002D06000-memory.dmp

    Filesize

    24KB

  • memory/2372-8-0x0000000001CE0000-0x0000000001CE6000-memory.dmp

    Filesize

    24KB