Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16/04/2024, 06:46

General

  • Target

    2024-04-16_dbc8e1544f25efe02086c0dcdde6a310_cryptolocker.exe

  • Size

    4.5MB

  • MD5

    dbc8e1544f25efe02086c0dcdde6a310

  • SHA1

    2b065923db3f628d416d7eb852ad62f02a0aa0ae

  • SHA256

    dbb015a7989a8841c487c5c68a62edbea08988ea7551b139c5b8bc4ab097f1ed

  • SHA512

    aa7e7c987fc41bb4e0a92274be90a30f4226745f82b3f9ca2c7d9ac8ab5b7d4a038b0dd6d290bc71b375807be26f834bb40eae118b831ad4f78033b3b6f16fa3

  • SSDEEP

    98304:g/ZFIjBzldUfs/ZFIjBz7jSZD1tU7ymTo:g/ZFIjBzF/ZFIjBzPEUuso

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-16_dbc8e1544f25efe02086c0dcdde6a310_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-16_dbc8e1544f25efe02086c0dcdde6a310_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2300
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2392

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

          Filesize

          4.5MB

          MD5

          145c727a4ff5610ed168fa729e03e569

          SHA1

          0a2b3a1ac9a2ad63d46a3ac00416aca94aba0d39

          SHA256

          c690e14c32b5721f6671e6eae28436d93a3157abc145ef4cd18d7c7861571601

          SHA512

          b658e1a376bdc699e181facbb779f784a55301367c9e554c57c9906569818d60cb25e5ae3c268956bd062d433aed22c42e773d33f29faac642180108d68e0c10

        • memory/2300-0-0x00000000002D0000-0x00000000002D6000-memory.dmp

          Filesize

          24KB

        • memory/2300-1-0x00000000002E0000-0x00000000002E6000-memory.dmp

          Filesize

          24KB

        • memory/2300-8-0x00000000002D0000-0x00000000002D6000-memory.dmp

          Filesize

          24KB

        • memory/2392-15-0x00000000002B0000-0x00000000002B6000-memory.dmp

          Filesize

          24KB

        • memory/2392-22-0x00000000002A0000-0x00000000002A6000-memory.dmp

          Filesize

          24KB