Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    17-05-2024 00:02

General

  • Target

    2024-05-16_6625a57769aa6bd214fa6a2151997503_cryptolocker.exe

  • Size

    33KB

  • MD5

    6625a57769aa6bd214fa6a2151997503

  • SHA1

    29f9e4760f182ab3d24abdd07bea7057182f56f7

  • SHA256

    7fdded5438b55b16e110a67bf888f786ab65f60e275fbd02d0bfc532b4141bb6

  • SHA512

    3eed9aed0cb202141299ecaad5adaa209268c9e52b1537924970fb0f6e12ed87111fa5d7e097a951cf9282f5f8e1ac42dd1d38d8282a02e89af25f165575a6a9

  • SSDEEP

    384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSznStEkcsg5:b/yC4GyNM01GuQMNXw2PSjSKkcJ5

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-16_6625a57769aa6bd214fa6a2151997503_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-16_6625a57769aa6bd214fa6a2151997503_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1884
    • C:\Users\Admin\AppData\Local\Temp\retln.exe
      "C:\Users\Admin\AppData\Local\Temp\retln.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:3060

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\retln.exe

    Filesize

    33KB

    MD5

    262b814792c265aa0d756199353419de

    SHA1

    331b1a9a9e2e9635539c3594406c817c5223be01

    SHA256

    012c8b24aab19790e4a57dc061830123384f6381f39740f635e6afdff5320a33

    SHA512

    679231d8cea885577d4e156f2622adaa51ada1398dfdb3cb24b093f175fc4f027dd3235ddc2bd5e1dbfc4ea44f2489280f720bf651ae18913aade492973f5735

  • memory/1884-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/1884-1-0x00000000002D0000-0x00000000002D6000-memory.dmp

    Filesize

    24KB

  • memory/1884-0-0x00000000002D0000-0x00000000002D6000-memory.dmp

    Filesize

    24KB

  • memory/3060-23-0x0000000000290000-0x0000000000296000-memory.dmp

    Filesize

    24KB