Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    29-04-2024 05:28

General

  • Target

    2024-04-29_5b42bc4efe0067aa860dd469ba6291e5_cryptolocker.exe

  • Size

    43KB

  • MD5

    5b42bc4efe0067aa860dd469ba6291e5

  • SHA1

    89f78f655e14385078cfe0f8e545cf5ee8d0abee

  • SHA256

    9e3d9313af4007202ca124e59a057850aa3131853de5f979ba47d54511422fe3

  • SHA512

    2f8214527c9bf38cd59ed54b0b0ece336713a71af2e3e617f070c51308f19ff7fff43de2c8ad1e331fddaf442b733ef1348c1b8bf38a64a91ff4b50b40a7aa4c

  • SSDEEP

    768:b7o/2n1TCraU6GD1a4X0WcO+wMVm+slAMphqp:bc/y2lkF0+Beqp

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-29_5b42bc4efe0067aa860dd469ba6291e5_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-29_5b42bc4efe0067aa860dd469ba6291e5_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3028
    • C:\Users\Admin\AppData\Local\Temp\rewok.exe
      "C:\Users\Admin\AppData\Local\Temp\rewok.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2988

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\rewok.exe

    Filesize

    43KB

    MD5

    9fb817f7f3186db777f4b5f7b64b0ef4

    SHA1

    e61af4090784199afc24b28638403adfdef5e2ef

    SHA256

    72a010cf3e17b73c2281b53f1b437bb28976817d21b09c76692791ae124068b5

    SHA512

    8272534d9baa9c2417f441ea3d0f99d67358d45c2ce091164b8b36b06492c7a92fc981ab887022fd31e00ee864f1e083f9c58957462cb8841d5ba0697e527dd6

  • memory/2988-23-0x0000000002920000-0x0000000002926000-memory.dmp

    Filesize

    24KB

  • memory/3028-0-0x0000000000370000-0x0000000000376000-memory.dmp

    Filesize

    24KB

  • memory/3028-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/3028-8-0x0000000000370000-0x0000000000376000-memory.dmp

    Filesize

    24KB