Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11/04/2024, 07:52

General

  • Target

    2024-04-11_d765bdf9ebcba2f16bac0e0809a1435b_cryptolocker.exe

  • Size

    21KB

  • MD5

    d765bdf9ebcba2f16bac0e0809a1435b

  • SHA1

    4232ac2543293584a6a3b3b2bad37c3ba60271f3

  • SHA256

    edb6ef2114190c96d16ff144aaf5e50839eb1302558def660075b8cf6d72eddc

  • SHA512

    bddfaeca2a843e7c0b69c08281a06e529198b951ce22ff2b5156d818cd5e74c0d7c577c4766ec7123abbeae0938cfcf2d4d1dcb867a3edd6a54b753642ec92da

  • SSDEEP

    384:bVCPwFRuFn65arz1ZhdaXFXSCVQTLfjDp6H4:bVCPwFRo6CpwXFXSqQXfjAY

Score
9/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 6 IoCs
  • UPX dump on OEP (original entry point) 6 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-11_d765bdf9ebcba2f16bac0e0809a1435b_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d765bdf9ebcba2f16bac0e0809a1435b_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    22KB

    MD5

    96f6342ad24535a0882cf79b0ed74c22

    SHA1

    068387e4ccf9444f7e7d0f368314691cdb393798

    SHA256

    d36d2f1becb437f4d4ac286e375f91a89da1687050c9345eb121a5b94a6bb9ae

    SHA512

    1c0f5639c449e217c40c48cf6a20fa69172bd89b7bf55d98442a278a114744d6111a2d60b7bef371a5806c4e3ba44a59c30d92c06bc9e426f89f71d57450bb51

  • memory/2212-0-0x0000000008000000-0x000000000800E000-memory.dmp

    Filesize

    56KB

  • memory/2212-1-0x0000000000390000-0x0000000000396000-memory.dmp

    Filesize

    24KB

  • memory/2212-2-0x0000000000630000-0x0000000000636000-memory.dmp

    Filesize

    24KB

  • memory/2212-4-0x0000000000390000-0x0000000000396000-memory.dmp

    Filesize

    24KB

  • memory/2212-15-0x0000000008000000-0x000000000800E000-memory.dmp

    Filesize

    56KB

  • memory/2212-12-0x0000000001C90000-0x0000000001C9E000-memory.dmp

    Filesize

    56KB

  • memory/2532-17-0x0000000008000000-0x000000000800E000-memory.dmp

    Filesize

    56KB

  • memory/2532-19-0x0000000001CB0000-0x0000000001CB6000-memory.dmp

    Filesize

    24KB

  • memory/2532-26-0x0000000001CA0000-0x0000000001CA6000-memory.dmp

    Filesize

    24KB

  • memory/2532-27-0x0000000008000000-0x000000000800E000-memory.dmp

    Filesize

    56KB