Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    08-04-2024 22:53

General

  • Target

    2024-04-08_e6cbb8bfbd8003d48029e4bad90f858a_cryptolocker.exe

  • Size

    32KB

  • MD5

    e6cbb8bfbd8003d48029e4bad90f858a

  • SHA1

    48e524faba1d55ae576538f4ce16f17d675b806e

  • SHA256

    9890331ba60b45a77035bb877957bf90e5d8df33b71f67e4e9bb3f93066c1aad

  • SHA512

    3149fbf641ad9bd12e047c267fc62930f8fa31b4eb241809fecaa6ef0f6c81ba9670a3a003cd5a0b78f0d6b3516a4bc79281d61cd75df20d447851172ce08651

  • SSDEEP

    384:bmM0V/YPvnr801TRoUGPh4TKt6ATt1DqgPa3s/zzoCt9/BOv2:b7o/2n1TCraU6GD1a4Xt9Qe

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-08_e6cbb8bfbd8003d48029e4bad90f858a_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-08_e6cbb8bfbd8003d48029e4bad90f858a_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2216
    • C:\Users\Admin\AppData\Local\Temp\rewok.exe
      "C:\Users\Admin\AppData\Local\Temp\rewok.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\rewok.exe

    Filesize

    32KB

    MD5

    328dc373b04723740b3c8a24ba8290ac

    SHA1

    11febbe6ccd678f5796efcda894bbd2cb15b4588

    SHA256

    ea265743fdc39af8237fc429166351a54d8176e20141f1e9e070e5cdebe92d79

    SHA512

    e7d3bb155ab892f641956379648f56cc84aca6511f49442476b8790a23d34112bc7ccbbb5521fd60c1ef9610652ae4fb0571e5dfcbdee884d226149f195357ea

  • memory/868-17-0x00000000003D0000-0x00000000003D6000-memory.dmp

    Filesize

    24KB

  • memory/2216-0-0x0000000000420000-0x0000000000426000-memory.dmp

    Filesize

    24KB

  • memory/2216-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2216-8-0x0000000000420000-0x0000000000426000-memory.dmp

    Filesize

    24KB