Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25/04/2024, 05:29

General

  • Target

    2024-04-25_4796f7a88c416ed96cc00c64211db6ab_cryptolocker.exe

  • Size

    34KB

  • MD5

    4796f7a88c416ed96cc00c64211db6ab

  • SHA1

    87fb346dccd0c071c9e848769e7ac5910046c4e6

  • SHA256

    c86e443f39edc423395938ffb5cd0651ba2f72b6dfe7eb45a8e6f6546d86413a

  • SHA512

    149742582d21e9937e05401e968480866883913c098674d7d36a6f7887c396ea426c74a1a78f5f20c90da2cb8e5708e7c1782cbe6a9d5d2a4dd215931a57e834

  • SSDEEP

    384:bA74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUgIunIVpeNs23mAA6lxZZX:bA74zYcgT/Ekd0ryfjPIunqpeNswm6Z5

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-25_4796f7a88c416ed96cc00c64211db6ab_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4796f7a88c416ed96cc00c64211db6ab_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2148

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    34KB

    MD5

    580d3f2ff0f98470fb809df40ab394f0

    SHA1

    2360872955e38a481d8fa842790c9faf607db935

    SHA256

    56eb0b4e88894587176135b015caf861263992d578795f2acb8a45d73eb93875

    SHA512

    cc32fcbe21d8ccb4f4c93ede41a6c973092c9e420269c5320af26cface63aa46f03b812c9abd77250b4057a1f1188c9c2609193ec1c7ae027d8c2ef203f371e3

  • memory/2148-15-0x00000000003A0000-0x00000000003A6000-memory.dmp

    Filesize

    24KB

  • memory/2148-22-0x0000000000390000-0x0000000000396000-memory.dmp

    Filesize

    24KB

  • memory/2932-0-0x0000000000570000-0x0000000000576000-memory.dmp

    Filesize

    24KB

  • memory/2932-1-0x0000000000580000-0x0000000000586000-memory.dmp

    Filesize

    24KB

  • memory/2932-8-0x0000000000570000-0x0000000000576000-memory.dmp

    Filesize

    24KB