Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    05/04/2024, 09:58

General

  • Target

    2024-04-05_d3ffc3e68089bba73209560c5803554f_cryptolocker.exe

  • Size

    32KB

  • MD5

    d3ffc3e68089bba73209560c5803554f

  • SHA1

    a7d715b55e86c8323c6b8d6245c6bb5e77f4417c

  • SHA256

    78d1a006e6dea663d6ec7804532cc74e7f3e878fedf08a1fb28fcb685bad6f63

  • SHA512

    bedf72bee51e9bc44e0b4e73445cd65fb2b3a77945c4646913ce5d1869933d2e7e889eaa7d5f54a341bf3091e39d41e4817db43c70117877418a472c4d5509c0

  • SSDEEP

    384:bAvMaNGh4z7CG3POOvbRSLoF/F0QU5XYFnufc/zzo6cuah0G1+2aW:bAvJCYOOvbRPDEgXRcN1j

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-05_d3ffc3e68089bba73209560c5803554f_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-05_d3ffc3e68089bba73209560c5803554f_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2488
    • C:\Users\Admin\AppData\Local\Temp\demka.exe
      "C:\Users\Admin\AppData\Local\Temp\demka.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:3000

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\demka.exe

          Filesize

          32KB

          MD5

          8bc005494c3556b18e6b8161b0f000de

          SHA1

          a79c588563b6e119844c470bfed017c057be03da

          SHA256

          3b1adeb518d5e6c27a69c4346c818a69ac0c00ec4413c0cfb618146d8176ecf3

          SHA512

          5b2cc69419830b91c38c2acafedf1a3bd6868d302ff69bd00b847d59ce6b850de5f758b154503bb2c766bf5234fcfe29a1d5fdf77da4af9bf152f523d417faca

        • memory/2488-0-0x00000000003C0000-0x00000000003C6000-memory.dmp

          Filesize

          24KB

        • memory/2488-2-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/2488-1-0x00000000003C0000-0x00000000003C6000-memory.dmp

          Filesize

          24KB

        • memory/3000-17-0x0000000000280000-0x0000000000286000-memory.dmp

          Filesize

          24KB