Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    16/04/2024, 20:25

General

  • Target

    2024-04-16_e2038ec4fa4036d5a56b7a369055d3ee_cryptolocker.exe

  • Size

    389KB

  • MD5

    e2038ec4fa4036d5a56b7a369055d3ee

  • SHA1

    148fc84fecc990acb375c1a89b7372929d07899a

  • SHA256

    5de7a0a3b5e3c038983e87285ecc9b440094e6bf2fc49bd996d3374cdaa7bacb

  • SHA512

    57fc3445639ae63eb1411b2609a015306013a1a5b8b75b0c150ba8a8cf0d716655b1f220ca5810b5765aab6077e1937e69804a656f8af743976e6d6359dbffbe

  • SSDEEP

    6144:nnOsaQgAOjvrZFODJjBz3j1jTqQy6v2GGnugOtihzXI:nnOflT/ZFIjBz3xjTxynGUOUhXI

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-16_e2038ec4fa4036d5a56b7a369055d3ee_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-16_e2038ec4fa4036d5a56b7a369055d3ee_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2976

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    389KB

    MD5

    3254dfcfe7bddddde78acd5435a3aa93

    SHA1

    7eeb7e7e0abb813efabdf644018de1d1039ab8c9

    SHA256

    c2d90f09fbca2a0a77c487eb733752339209e3103c0f983534661cce35b57d64

    SHA512

    8b7d528423c7d731afe68ebfe28a34584ff6f03912b231bc5943dcfef8cdfd649cbb789e25883860d481affb14b8027aaf3fbb9f5ca49414e9f12563d7b0e919

  • memory/2976-15-0x0000000001BD0000-0x0000000001BD6000-memory.dmp

    Filesize

    24KB

  • memory/2976-22-0x0000000000410000-0x0000000000416000-memory.dmp

    Filesize

    24KB

  • memory/3012-0-0x00000000004C0000-0x00000000004C6000-memory.dmp

    Filesize

    24KB

  • memory/3012-1-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/3012-8-0x00000000004C0000-0x00000000004C6000-memory.dmp

    Filesize

    24KB