Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    24/04/2024, 22:41

General

  • Target

    f7601b08b75d1774f0bfe9bf69899b8194a85f4786c492a1fccf06f1e5f6ceb9.exe

  • Size

    42KB

  • MD5

    985cf6553b6810042f0409b0b58bac43

  • SHA1

    182a5658e5d0bc393e0b49f21e7c4dce3f731290

  • SHA256

    f7601b08b75d1774f0bfe9bf69899b8194a85f4786c492a1fccf06f1e5f6ceb9

  • SHA512

    b175f603ff469a6058cc2ff8b60266dca920d63291fc6b6b3c6a89c8100f9d494ede416aea4d5ac788316297121d427a2f5e4c2057265441a12403dc7e16c8ba

  • SSDEEP

    384:bm74uGLLQRcsdeQ72ngEr4K7YmE8uYo0nrlwfjDUOl:bm74zYcgT/Ek70ryfjBl

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f7601b08b75d1774f0bfe9bf69899b8194a85f4786c492a1fccf06f1e5f6ceb9.exe
    "C:\Users\Admin\AppData\Local\Temp\f7601b08b75d1774f0bfe9bf69899b8194a85f4786c492a1fccf06f1e5f6ceb9.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2936
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2852

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

          Filesize

          42KB

          MD5

          029b36e3b045560ccea2dc0f3b7dec3a

          SHA1

          9f9c3a52a689566dd13009e8342a94eb5fa625e9

          SHA256

          8456bdf4044e74cac1bd9cdde08798f1118f06a4d0acd43bce4c7a50c380a6a8

          SHA512

          ab49882cb460a7d2ee09794906db4ee03d98eff6305149ad6507ab24de5a0820881d5bd0a54a66801cf742e1eb7c24dfdb475b75037c85416591e4dd11e3b924

        • memory/2852-17-0x0000000008000000-0x000000000800D000-memory.dmp

          Filesize

          52KB

        • memory/2852-18-0x00000000003A0000-0x00000000003A6000-memory.dmp

          Filesize

          24KB

        • memory/2852-22-0x0000000000390000-0x0000000000396000-memory.dmp

          Filesize

          24KB

        • memory/2852-26-0x0000000008000000-0x000000000800D000-memory.dmp

          Filesize

          52KB

        • memory/2936-0-0x0000000008000000-0x000000000800D000-memory.dmp

          Filesize

          52KB

        • memory/2936-1-0x00000000002A0000-0x00000000002A6000-memory.dmp

          Filesize

          24KB

        • memory/2936-2-0x00000000002B0000-0x00000000002B6000-memory.dmp

          Filesize

          24KB

        • memory/2936-8-0x00000000002A0000-0x00000000002A6000-memory.dmp

          Filesize

          24KB

        • memory/2936-15-0x0000000008000000-0x000000000800D000-memory.dmp

          Filesize

          52KB