Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240319-en
  • resource tags

    arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system
  • submitted
    26-03-2024 18:24

General

  • Target

    2024-03-26_19efc34f87bfb789a036bd820706b811_cryptolocker.exe

  • Size

    43KB

  • MD5

    19efc34f87bfb789a036bd820706b811

  • SHA1

    5ecac2beda037fadaacebc110cbfe552314a2936

  • SHA256

    7f7454fd9c633012502ac03c3ddd505aa99da588f8ffa2b58d6acc9f95859bee

  • SHA512

    0484cee0339772bfb6fa10fbe2cfc8eccfd68dc6a5c788603d6dd8dffe3009fc3ad3f97f8ed743ebf55a24fa2221aca10e4e6a33abe307e3e8bbda35186a4185

  • SSDEEP

    768:bgX4zYcgTEu6QOaryfjqDDw3sCu5b+syQNcH:bgGYcA/53GADw8Cl/5H

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-26_19efc34f87bfb789a036bd820706b811_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-26_19efc34f87bfb789a036bd820706b811_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1372
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:1728

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    43KB

    MD5

    65d65754c28310aa00ba1707fcf1e8a9

    SHA1

    db051d33da46cf34c2e9fb10bbbb79e9ebd742db

    SHA256

    9f99a884e7c70cb25d990851649a37d3612eff9e6630a0776956ffe4541d156e

    SHA512

    4131ec4930257cd18a795a99d5c78c3bf4162e253763e7c35b327186211187db2611d6ed2d8819c91809a7562d01dd624a5cec87c49ebc7afb8a2a5f0989e6ef

  • memory/1372-0-0x0000000000340000-0x0000000000346000-memory.dmp

    Filesize

    24KB

  • memory/1372-1-0x0000000000340000-0x0000000000346000-memory.dmp

    Filesize

    24KB

  • memory/1372-2-0x0000000000570000-0x0000000000576000-memory.dmp

    Filesize

    24KB

  • memory/1728-15-0x0000000000290000-0x0000000000296000-memory.dmp

    Filesize

    24KB

  • memory/1728-22-0x0000000000270000-0x0000000000276000-memory.dmp

    Filesize

    24KB