Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    27/05/2024, 04:23

General

  • Target

    2024-05-27_028d77384e5843219d1bbf709dcde202_cryptolocker.exe

  • Size

    37KB

  • MD5

    028d77384e5843219d1bbf709dcde202

  • SHA1

    cd0f1818043cf70e28c0dde416cc38eacf10bae1

  • SHA256

    826eeb590c062075afdbb22d068cd39eb461cbd76bb9859c88574517994a3c3d

  • SHA512

    5b4ca50f330958008e5d8054f4e141c36e15010771bfc8981234a6ec272157d47c67c5ca974e49f08564ceb3573e7b2dc45e501aa4610962f06eeb5bf45e4834

  • SSDEEP

    384:bA74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUgIunexRlSrxV1PVGw:bA74zYcgT/Ekd0ryfjPIunYwfPVz

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-27_028d77384e5843219d1bbf709dcde202_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-27_028d77384e5843219d1bbf709dcde202_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1576
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2336

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\hasfj.exe

          Filesize

          37KB

          MD5

          946d452c881118a72e991774d36e203e

          SHA1

          7d3841da68083c5517824569308e3481e9cca1d5

          SHA256

          3c6144711452af816fa1e7325c84bb8ff4dd94d854e09b60000433df6b34d433

          SHA512

          461fe7fb978cd8bac0b0ba93b0621d098d7204d7c217baf83b9ac2fbec77270a1337b9b1c199e3de111f1f031640ac3b93bebeae9ea5a0f7ba8611f1a6ad59ac

        • memory/1576-8-0x0000000000320000-0x0000000000326000-memory.dmp

          Filesize

          24KB

        • memory/1576-1-0x0000000000330000-0x0000000000336000-memory.dmp

          Filesize

          24KB

        • memory/1576-0-0x0000000000320000-0x0000000000326000-memory.dmp

          Filesize

          24KB

        • memory/2336-15-0x0000000000320000-0x0000000000326000-memory.dmp

          Filesize

          24KB

        • memory/2336-22-0x0000000000310000-0x0000000000316000-memory.dmp

          Filesize

          24KB