Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26-03-2024 02:24

General

  • Target

    2024-03-26_031f4da07ee5c365cc8fdcfb543075c2_cryptolocker.exe

  • Size

    34KB

  • MD5

    031f4da07ee5c365cc8fdcfb543075c2

  • SHA1

    294c0c524c23f0fd1722e61ff2142a7b9987adfb

  • SHA256

    494dd97d46f7c8ec68b756c23529c84f0920c6b9fdc6218d1b6990d22ac883c6

  • SHA512

    ef9b3189d1064061e06b07fbc43e55d40cdce91492de16dea3d32f8fdd645db49dfef51a3670819b0454478fd9d5afc2d7d9c0613ca56883090a3a01c5145631

  • SSDEEP

    384:bA74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUr766SJXTQke8SEMMG:bA74zYcgT/Ekd0ryfjQRSNhpSFr

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-26_031f4da07ee5c365cc8fdcfb543075c2_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-26_031f4da07ee5c365cc8fdcfb543075c2_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2340
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2520

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    35KB

    MD5

    55e686695ac6e2ceac185d6c9351041a

    SHA1

    41d34cf30369e09e17d8af6f2b2986b705340c68

    SHA256

    e0bbdd2d617669b2415b14a2606a33a0dea76e7ea55c18687d05ea4b844647c6

    SHA512

    9b7aae2988a5c5977952719fcd44ab5d8e730807e8785793593055ca0bba978d2e1d250a97649de49fea4c945be77d765178ecd9ace82d647a20e55240397c96

  • memory/2340-0-0x0000000000290000-0x0000000000296000-memory.dmp

    Filesize

    24KB

  • memory/2340-1-0x00000000002B0000-0x00000000002B6000-memory.dmp

    Filesize

    24KB

  • memory/2340-8-0x0000000000290000-0x0000000000296000-memory.dmp

    Filesize

    24KB

  • memory/2520-15-0x00000000003A0000-0x00000000003A6000-memory.dmp

    Filesize

    24KB

  • memory/2520-22-0x0000000000390000-0x0000000000396000-memory.dmp

    Filesize

    24KB