Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    16-04-2024 04:20

General

  • Target

    2024-04-16_fd2c0ca55d9b3e551e03072dca4b1fcc_cryptolocker.exe

  • Size

    38KB

  • MD5

    fd2c0ca55d9b3e551e03072dca4b1fcc

  • SHA1

    ae2b44211d15a43490ed5a388a1ee6ea96e6ce1b

  • SHA256

    ee54c215dc12825baa83a0246ad09abea09a3839b371aea77bb0a5ed37302593

  • SHA512

    8f02a48684fc0404ae0703d6337f43f32a12504c1af2cbb3e7f9c32786e5aac56c05bba845580b7a8ed82c4964eb6968e1b4f727f91b2fc5cafd734657a58af5

  • SSDEEP

    768:bA74zYcgT/Ekd0ryfjPIunqpeNswmT3HH:bA6YcA/X6G0W143n

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-16_fd2c0ca55d9b3e551e03072dca4b1fcc_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-16_fd2c0ca55d9b3e551e03072dca4b1fcc_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2952
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    38KB

    MD5

    3c195c8f9622fc5acbce57373b228a37

    SHA1

    ec547c7cedb1acb20af490f19f3ee3296d203544

    SHA256

    49083b7649fc38a458a0b382af4422f03c562bf0f67eb3a9f7f96e72f77a09d3

    SHA512

    e249d341f44a38e8882f4b3294ed4fc5182b568e4d181272a3176c6ccaaabab670ac0488f32834926a46ae8c2716379f0171086cd64d0b46d20dc40f4c0891e7

  • memory/2616-15-0x0000000001CB0000-0x0000000001CB6000-memory.dmp

    Filesize

    24KB

  • memory/2616-22-0x0000000001CA0000-0x0000000001CA6000-memory.dmp

    Filesize

    24KB

  • memory/2952-0-0x0000000000510000-0x0000000000516000-memory.dmp

    Filesize

    24KB

  • memory/2952-1-0x0000000000520000-0x0000000000526000-memory.dmp

    Filesize

    24KB

  • memory/2952-7-0x0000000000510000-0x0000000000516000-memory.dmp

    Filesize

    24KB