Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    17-05-2024 13:33

General

  • Target

    2024-05-17_99bfe9b45da64b99ec88bc8ee5890d96_cryptolocker.exe

  • Size

    35KB

  • MD5

    99bfe9b45da64b99ec88bc8ee5890d96

  • SHA1

    8638bc77c7127fab387d7acfeeec9dc8e2e6f611

  • SHA256

    f3883d6cc88f7ac8a7be784a6e247b99cbccf992b44f5c40dff8a3352aed5c35

  • SHA512

    a6b4278715891f8b8baf400be1da3688538566a5d795f76378b2e2498c5b906bbc6836500a6bf28c0d2a197653d3c2359ca9df3b39e688af36684446bcecef68

  • SSDEEP

    384:bA74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUgIunIVpeNs23mAA6lxG:bA74zYcgT/Ekd0ryfjPIunqpeNswm6G

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-17_99bfe9b45da64b99ec88bc8ee5890d96_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-17_99bfe9b45da64b99ec88bc8ee5890d96_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2780

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    36KB

    MD5

    c34fb090f77951d16c77c9c4e242d85d

    SHA1

    851b01bbdfe78c6207f6b2ad0e0cc591704f817f

    SHA256

    86b0e32d89689f0d6f7a56e60268116888acb2e7dc59c8afa80eccfd3babe6c9

    SHA512

    62be17c31ec939cb6e04a64cfd55dfc6aa9d49b249c7ac630d5e7f4ee716fc55e8f80985d55fd7ac5022dad9e9923cc646241cdee87f4d5bc9ab4e5df90b1bfb

  • memory/1964-0-0x0000000001CE0000-0x0000000001CE6000-memory.dmp

    Filesize

    24KB

  • memory/1964-1-0x0000000001CF0000-0x0000000001CF6000-memory.dmp

    Filesize

    24KB

  • memory/1964-8-0x0000000001CE0000-0x0000000001CE6000-memory.dmp

    Filesize

    24KB

  • memory/2780-15-0x0000000000450000-0x0000000000456000-memory.dmp

    Filesize

    24KB

  • memory/2780-22-0x00000000002E0000-0x00000000002E6000-memory.dmp

    Filesize

    24KB