Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24/05/2024, 00:29

General

  • Target

    2024-05-24_3c0b0fbd17ca74f81efa58631836c62d_cryptolocker.exe

  • Size

    44KB

  • MD5

    3c0b0fbd17ca74f81efa58631836c62d

  • SHA1

    c6322394ca428ea8355341fb2d4e630e043af3dd

  • SHA256

    2fa7e88238ebd7c8099b80b091492418d6c7c0bc448ab989470bc7744e4092a9

  • SHA512

    1834004a178ca645310c9c698eddc13768c10e748dd35bcdb17fcf4d4556586ca59ffa3c39d5b72db592ebebf920365a43ac5f578286d6845986026eb535537c

  • SSDEEP

    768:b/yC4GyNM01GuQMNXw2PSjHPbSuYlW8PAM:b/pYayGig5HjS3NPAM

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-24_3c0b0fbd17ca74f81efa58631836c62d_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-24_3c0b0fbd17ca74f81efa58631836c62d_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Users\Admin\AppData\Local\Temp\retln.exe
      "C:\Users\Admin\AppData\Local\Temp\retln.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2800

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\retln.exe

          Filesize

          44KB

          MD5

          7a85d703322c5a4be3be29c020e6e849

          SHA1

          ff8262e0722655a52dece36d01aedc393b3cbd0e

          SHA256

          f9008983a2254f3489e05030feb8053342c10c617fb17ee3adfaaa6c5b2e39ff

          SHA512

          e4ac7608792de784abd5c119fb0ca87c267d05e27200bc89dc440c97942e4f1b2bc2c4756b9b4265d647b36c6cdf36b8b4fbdd549edc9ff0ea68becc382deb0e

        • memory/2244-8-0x00000000003B0000-0x00000000003B6000-memory.dmp

          Filesize

          24KB

        • memory/2244-1-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/2244-0-0x00000000003B0000-0x00000000003B6000-memory.dmp

          Filesize

          24KB

        • memory/2800-23-0x00000000003A0000-0x00000000003A6000-memory.dmp

          Filesize

          24KB