Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05/04/2024, 07:34

General

  • Target

    2024-04-05_7cfc79e91d7ecb2948edc3a6e2b4d60e_cryptolocker.exe

  • Size

    31KB

  • MD5

    7cfc79e91d7ecb2948edc3a6e2b4d60e

  • SHA1

    4bc6b25fb245b8e0a0561d193285d44ba7326536

  • SHA256

    36990e5c3ade0ee958fd52bba07df41e9c4799e51c6734eefbd884d880cc721e

  • SHA512

    ff091762d215cdf1d30513205dddb951e013cd41b95bf7a438105dfb9cb64d17d10451325d3bb21c305c293c2505ee8f3fc16094aa156e1918a01668ad5e572f

  • SSDEEP

    384:bA74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUr766SJ5STV9Zoi:bA74zYcgT/Ekd0ryfjQRSnWV9ii

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-05_7cfc79e91d7ecb2948edc3a6e2b4d60e_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-05_7cfc79e91d7ecb2948edc3a6e2b4d60e_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2492
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2288

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\hasfj.exe

          Filesize

          32KB

          MD5

          feaab77a8d028566db9f9169b4fba4b9

          SHA1

          8b2ab29ad1e8e15ed34e32b786d65f7fcdc55a6a

          SHA256

          2ae5ddf51f88399f6a932638ef0fb9cebbe60074fd57ff8cfb9aaab6c3810ad7

          SHA512

          b234b4e416ebf4f479ebbf3e98b9c6f25ff59f4d77efda13d141fa8d0e6a6939930a664731831d93e385e106de9350129bb2cea73e5a018b68dbc5bd14d98912

        • memory/2288-15-0x0000000000380000-0x0000000000386000-memory.dmp

          Filesize

          24KB

        • memory/2288-22-0x0000000000360000-0x0000000000366000-memory.dmp

          Filesize

          24KB

        • memory/2492-0-0x0000000000450000-0x0000000000456000-memory.dmp

          Filesize

          24KB

        • memory/2492-1-0x00000000004B0000-0x00000000004B6000-memory.dmp

          Filesize

          24KB

        • memory/2492-2-0x0000000000450000-0x0000000000456000-memory.dmp

          Filesize

          24KB