Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    18-04-2024 08:28

General

  • Target

    2024-04-18_58515856491edfae4e28dde5fe1294fc_cryptolocker.exe

  • Size

    36KB

  • MD5

    58515856491edfae4e28dde5fe1294fc

  • SHA1

    29465a1b65ad4bf30ea79d300ee231eec928eb1c

  • SHA256

    51001316e915fd7f0a30663e23caa190807d96367ed0ff89b7e295a8619c08cb

  • SHA512

    8c5df7a767d61f935989f30229f6652fdd98b2bcf572cb0758f10758e0c3d2ce2a63665b7c7fbfa74e32d514aef69c08a915fa3503ee91d6c7049f652d055fb8

  • SSDEEP

    384:bAvMaNGh4z7CG3POOvbRSLoF/F0QU5XYFnufc/zzo6c3l8Sz960SPluhX:bAvJCYOOvbRPDEgXRc3SSz3SPq

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-18_58515856491edfae4e28dde5fe1294fc_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-18_58515856491edfae4e28dde5fe1294fc_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1524
    • C:\Users\Admin\AppData\Local\Temp\demka.exe
      "C:\Users\Admin\AppData\Local\Temp\demka.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2144

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\demka.exe

    Filesize

    36KB

    MD5

    e6a1ec9d61ada9e3034121e9ed2ded6d

    SHA1

    3928efe2e529f01c2800ec597e19a3234e9b1d16

    SHA256

    60742dece17b96022ec5a8e4c8450d28a9094aa6ae639bf0d6b72829e80e8382

    SHA512

    d3c9e9d3ead32ec319cd8d56b87af37228b17435f006f386399272598305fdcb8ad0a4931e1aa2bd2866f62d270d607e0397554a9c55e72a1830f9395baf86bc

  • memory/1524-0-0x0000000000360000-0x0000000000366000-memory.dmp

    Filesize

    24KB

  • memory/1524-2-0x0000000000360000-0x0000000000366000-memory.dmp

    Filesize

    24KB

  • memory/1524-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2144-18-0x0000000000260000-0x0000000000266000-memory.dmp

    Filesize

    24KB