Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    22-04-2024 04:50

General

  • Target

    2024-04-22_5f5cdd328c5ea70f138151467bc33bf0_cryptolocker.exe

  • Size

    36KB

  • MD5

    5f5cdd328c5ea70f138151467bc33bf0

  • SHA1

    d1215c9bd15743868aad46beaa070bcef1748f14

  • SHA256

    46ad58cee9214ace75690bc53021c0990b6aed14f20d11c8b5846647009d35dd

  • SHA512

    7350ff067ba165447aec27aa20fec576ca5ea6d5668f3aa1865c2895a067bbe4628c32255625bb7e871169d4ff7489394a38acaf769fd2203d157e4f3b5d9d85

  • SSDEEP

    384:bmM0V/YPvnr801TRoUGPh4TKt6ATt1DqgPa3s/zzoCt9/B1RU3qE4kb6oY261:b7o/2n1TCraU6GD1a4Xt9bRU6zA6o361

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-22_5f5cdd328c5ea70f138151467bc33bf0_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-22_5f5cdd328c5ea70f138151467bc33bf0_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Users\Admin\AppData\Local\Temp\rewok.exe
      "C:\Users\Admin\AppData\Local\Temp\rewok.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:3048

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\rewok.exe

    Filesize

    36KB

    MD5

    f3c4b04b7174a3bda1867beb1d087df8

    SHA1

    df3a7c246c9aa1a66282317272c3de0b4966c815

    SHA256

    a77f9822c9020041f44f1281cd9b7e485c3288a8f3d5a0c5577097f200f82039

    SHA512

    0d73dc10003e4e1ba380608ce9ffebc53e06cede6e6ba578fa5a4a8cd28372a7c68c4b163241953c2d294440167c6506d24d71df5e55857c6d411c5f518d39a1

  • memory/1740-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/1740-0-0x00000000005C0000-0x00000000005C6000-memory.dmp

    Filesize

    24KB

  • memory/1740-3-0x00000000005C0000-0x00000000005C6000-memory.dmp

    Filesize

    24KB

  • memory/3048-16-0x0000000000290000-0x0000000000296000-memory.dmp

    Filesize

    24KB