Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    03-05-2024 03:35

General

  • Target

    2024-05-03_517ef21220d4b503e4f65b805a12c844_cryptolocker.exe

  • Size

    40KB

  • MD5

    517ef21220d4b503e4f65b805a12c844

  • SHA1

    1e79cdcf232436306088a8f87f7ee8aa059f8841

  • SHA256

    baa9b1d1ce1e6b102dbadc25ce6cc7654360d7a6afe922295187c04512ee1ce9

  • SHA512

    016305b751be7f4b415806b192bf15482c334f0b38390dd8868acf28fa7e23c53aa90a18987ec78869b939ab58ff68f1efa42397ec6264cce2471a1aef17cdbf

  • SSDEEP

    768:bA74zYcgT/Ekd0ryfjPIunqpeNswmxT4Hmz:bA6YcA/X6G0W1BGz

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-03_517ef21220d4b503e4f65b805a12c844_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-03_517ef21220d4b503e4f65b805a12c844_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2800
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    40KB

    MD5

    b026fdc301cfcc9eab825662e2a11ac6

    SHA1

    98de514f8b87692b612890a2ea0532fc0fa54bae

    SHA256

    9f86900a5ee9ba6b2d265d490abccecaa6a0a932ed09ef694f4cdc37c0c9a10f

    SHA512

    16e876bee1089b4948c7914b9170615eaa68a334e57cd22aadffac1373b82495d0c27049a2947f81149f172032e0acf2716925c7bfb2201bedc9da778e74770d

  • memory/2680-15-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB

  • memory/2680-16-0x00000000005B0000-0x00000000005B6000-memory.dmp

    Filesize

    24KB

  • memory/2800-1-0x0000000000370000-0x0000000000376000-memory.dmp

    Filesize

    24KB

  • memory/2800-0-0x0000000000360000-0x0000000000366000-memory.dmp

    Filesize

    24KB

  • memory/2800-8-0x0000000000360000-0x0000000000366000-memory.dmp

    Filesize

    24KB