Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26/03/2024, 00:26

General

  • Target

    2024-03-26_bb4e4cb9c547e9058930643f1177e0f2_cryptolocker.exe

  • Size

    50KB

  • MD5

    bb4e4cb9c547e9058930643f1177e0f2

  • SHA1

    3cb9199191a9e449b48f84199293f037cc7cec08

  • SHA256

    dec875f59fe278893404827f9987e1d961d87d845b0af73b2602e35ecaa1bd40

  • SHA512

    9af7aacb6e170ef6cf192af19bd306e921b79885458615a87ec184cabad8bb9e58726cffa9a05387c5a78c824bba123b1e721c547b303c976768d69872e40ae8

  • SSDEEP

    768:bgX4zYcgTEu6QOaryfjqDlC6JFbK37Yl6dIKld5CSO6:bgGYcA/53GAA6y37Q6dI+d5N

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-26_bb4e4cb9c547e9058930643f1177e0f2_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-26_bb4e4cb9c547e9058930643f1177e0f2_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2604

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    50KB

    MD5

    85587fbb86d2abf0dc178da9ff7360d0

    SHA1

    ab2345094e22209cf77daace8a89ebd6f70f6fb1

    SHA256

    214fc9a51c347d5a0e736ffab4aa09b27d1d98761f28504919f0cfdbe05a9349

    SHA512

    86dbdefd541548f63f4e18e68a9dea337a296c6236d5de890884364dfae2c656bf93f245d0590fdc04d1e180ba498365bc093b7cd6a6be3c55d0687321deeabe

  • memory/2604-16-0x0000000000320000-0x0000000000326000-memory.dmp

    Filesize

    24KB

  • memory/2604-15-0x0000000000300000-0x0000000000306000-memory.dmp

    Filesize

    24KB

  • memory/3012-0-0x0000000000270000-0x0000000000276000-memory.dmp

    Filesize

    24KB

  • memory/3012-2-0x00000000003A0000-0x00000000003A6000-memory.dmp

    Filesize

    24KB

  • memory/3012-1-0x0000000000270000-0x0000000000276000-memory.dmp

    Filesize

    24KB