Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2024, 09:49

General

  • Target

    2024-03-28_9612b1fda220f339a7ec51ae99ad88f2_cryptolocker.exe

  • Size

    41KB

  • MD5

    9612b1fda220f339a7ec51ae99ad88f2

  • SHA1

    dd08c669e9a34f680135f2dd0fdf2f46b35d29a2

  • SHA256

    b65b961bf1109ec54dbd3c261917a9552212040976884a97e37dca9a535178b4

  • SHA512

    3b1563a2e06c4c05cba3339cd5d6277686f2e9f2260649048cbb3550d2939c017a29078dabc151a73f07b82ea07cc10950f75cb575afeccd6008bb7a5d457c54

  • SSDEEP

    768:bAvJCYOOvbRPDEgXrNekd7l94i3py/yY//:bAvJCF+RQgJeab4sy/l/

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-28_9612b1fda220f339a7ec51ae99ad88f2_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-28_9612b1fda220f339a7ec51ae99ad88f2_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2956
    • C:\Users\Admin\AppData\Local\Temp\demka.exe
      "C:\Users\Admin\AppData\Local\Temp\demka.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:3048

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\demka.exe

          Filesize

          41KB

          MD5

          123003b6a1a3ef6d74b960328924e4f5

          SHA1

          6a99068476dea3eeeb04c7c3c1194460dd03acd0

          SHA256

          046bd06d1d66ab9495906fdb21171e0c20bbabd733545b851f808a8f61070092

          SHA512

          e2cc178e190f4bef912ab4cd1fd18b33339691c7f8275dc72966f03090329245b172c3f0fa13e9913e26b867590a8b6cfdc3fa2bf0c75ad56e5d628436515c19

        • memory/2956-0-0x0000000000360000-0x0000000000366000-memory.dmp

          Filesize

          24KB

        • memory/2956-2-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/2956-1-0x0000000000360000-0x0000000000366000-memory.dmp

          Filesize

          24KB

        • memory/3048-23-0x0000000000260000-0x0000000000266000-memory.dmp

          Filesize

          24KB