Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    03/05/2024, 07:29

General

  • Target

    2024-05-03_ae32787b2e7068846756353af1e1465b_cryptolocker.exe

  • Size

    33KB

  • MD5

    ae32787b2e7068846756353af1e1465b

  • SHA1

    95306eccc90804542b5be364fee2c5d81505c4f6

  • SHA256

    097f98e621a1388dad32c688d68fb9906ee67dffc11a8f985a84a4dc81c9d977

  • SHA512

    ad6f922e9bcccff4c413ffeb8678735e3b0bcedfc911a5204a16c7a5ade634d715abf9a533e120cf767fb49ca5694a09aeeb0ea258de1ac758040f3ba5b30ec4

  • SSDEEP

    384:bAvMaNGh4z7CG3POOvbRSLoF/F0QU5XYFnufc/zzo6ckJp0qAgmEzXKxA+T9Y:bAvJCYOOvbRPDEgXRc+BAILie

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-03_ae32787b2e7068846756353af1e1465b_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-03_ae32787b2e7068846756353af1e1465b_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Users\Admin\AppData\Local\Temp\demka.exe
      "C:\Users\Admin\AppData\Local\Temp\demka.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2872

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\demka.exe

          Filesize

          33KB

          MD5

          9119d6bc7655203d19273bbc70379734

          SHA1

          1c12ef040d1de098bd4ed3a33553231f053f0bf3

          SHA256

          894e6374d00bc352b83c7133c39edd4d414da4980a76478f18494c1d812ffc69

          SHA512

          feb62d8fac0c420d2b66079c61ace595c575255d54d4f7ffea7d3863807d01e4f3545c2eb3c33a2c1fed6f25b1af027305975a77f4d1f384bd052c67a990fdfb

        • memory/2240-8-0x00000000002E0000-0x00000000002E6000-memory.dmp

          Filesize

          24KB

        • memory/2240-1-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/2240-0-0x00000000002E0000-0x00000000002E6000-memory.dmp

          Filesize

          24KB

        • memory/2872-23-0x00000000003C0000-0x00000000003C6000-memory.dmp

          Filesize

          24KB