Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    16/04/2024, 04:35

General

  • Target

    2024-04-16_2894f120eb1de14f6df4583d9f8b0bcd_cryptolocker.exe

  • Size

    30KB

  • MD5

    2894f120eb1de14f6df4583d9f8b0bcd

  • SHA1

    b5f0b13cf4c915f1cfec67d45239bf1b15e7ccd9

  • SHA256

    f59031b2d4470b0dd6460294f89fd663af249e7875074dcb319ab18f8cfd1a3c

  • SHA512

    08d85af5c37de7f59d46fd1a8d9004bdc0b996a00cbc6b93529b7c589c368f1731fd9c77728d16b7ce6959a3662b20c1348eb6676e1bed6ae36ef1366cc912e4

  • SSDEEP

    384:bG74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUGTG1:bG74zYcgT/Ekd0ryfj0

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-16_2894f120eb1de14f6df4583d9f8b0bcd_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-16_2894f120eb1de14f6df4583d9f8b0bcd_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:1888

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    31KB

    MD5

    6521b36a3d68a915fe2ec94f29562e76

    SHA1

    28f9c601753798c983e550205802e434d2800e1e

    SHA256

    372fbda4f032b022b241b4ea5d3c538f0e3c1082130c11d04f5e2d541b3c215f

    SHA512

    d76a4c7d5a28d3664e09c977a811e4ea73e9f8060fbdabb0667947fe911210250403c03125f350f38e224401fe5f514a3c1e286e8ed3882b4d88eb677e06e425

  • memory/1724-0-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/1724-1-0x00000000003C0000-0x00000000003C6000-memory.dmp

    Filesize

    24KB

  • memory/1724-2-0x00000000003D0000-0x00000000003D6000-memory.dmp

    Filesize

    24KB

  • memory/1724-7-0x00000000003C0000-0x00000000003C6000-memory.dmp

    Filesize

    24KB

  • memory/1724-15-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/1888-16-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/1888-18-0x0000000000580000-0x0000000000586000-memory.dmp

    Filesize

    24KB

  • memory/1888-25-0x0000000000570000-0x0000000000576000-memory.dmp

    Filesize

    24KB

  • memory/1888-26-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB