Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 21:54

General

  • Target

    2024-05-25_67e01c0693d84f16ad1dd33ac2273bf1_cryptolocker.exe

  • Size

    37KB

  • MD5

    67e01c0693d84f16ad1dd33ac2273bf1

  • SHA1

    943b4e1e0371c682efe58c12953da824fb4b20fb

  • SHA256

    5cc1ea8f1a2913c2eddbda42c24c01f196271c03ffe093cebd123e73f7b69152

  • SHA512

    332e424368706599b152f567894129448ec87f3dbbaf1a201fe9cff76dabf1d6819169edb6b913e3b201b9e8b269e1e4c92c08e9590975b3172ddb846e648907

  • SSDEEP

    768:bAvJCYOOvbRPDEgXrNekd7l94i3pQheDh88:bAvJCF+RQgJeab4sbl

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-25_67e01c0693d84f16ad1dd33ac2273bf1_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-25_67e01c0693d84f16ad1dd33ac2273bf1_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Users\Admin\AppData\Local\Temp\demka.exe
      "C:\Users\Admin\AppData\Local\Temp\demka.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2556

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\demka.exe

    Filesize

    38KB

    MD5

    ca009e84ffaf9acede96e2f38dee109f

    SHA1

    f935b17151028d8bf234800803e8a1e2f7af6183

    SHA256

    b1b225f703c3ac9df50d2fd734ed2fffa1aedc0aff139435dc5723b298fe58c2

    SHA512

    aed4b80ef15774917c8de0b44ee023b9941983e08b5f210385567bdd6c44e29778bf5d4a5b714f05f4cf688e5c5dfb9652e20974695e9aadd8a4b9fea3fa8b63

  • memory/2556-23-0x00000000005C0000-0x00000000005C6000-memory.dmp

    Filesize

    24KB

  • memory/3012-0-0x00000000003C0000-0x00000000003C6000-memory.dmp

    Filesize

    24KB

  • memory/3012-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/3012-8-0x00000000003C0000-0x00000000003C6000-memory.dmp

    Filesize

    24KB