Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    27/05/2024, 13:24

General

  • Target

    2024-05-27_e2552e76e03d81d5157099cf7e10706e_cryptolocker.exe

  • Size

    31KB

  • MD5

    e2552e76e03d81d5157099cf7e10706e

  • SHA1

    dafc60ed4e1478b32fd89b107a24d91fd13d8df1

  • SHA256

    0a0a5ad0d7918696a2be22cdd0a07f9f85ca95fa90d93de7342a036ae24ed162

  • SHA512

    33a6180ca3707a1978790b049b546c46c96e9912c31683cde7daa27e6d055b68d96cf9f3683541501102e32b0ecb5b3cc5bdd837c86ea93559c0a64b626cfb8c

  • SSDEEP

    384:bAvMaNGh4z7CG3POOvbRSLoF/F0QU5XYFnufc/zzo6cJ3v74:bAvJCYOOvbRPDEgXRcJs

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-27_e2552e76e03d81d5157099cf7e10706e_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-27_e2552e76e03d81d5157099cf7e10706e_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Users\Admin\AppData\Local\Temp\demka.exe
      "C:\Users\Admin\AppData\Local\Temp\demka.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2708

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\demka.exe

          Filesize

          32KB

          MD5

          aa2f262db0debf72efe477fbff893b61

          SHA1

          15c5244023d336682af76b2ab543747d6dd6fa52

          SHA256

          5e16ddf346387a2f3ca63f63bf95e07e715b06dde344f5f876afbffde113bbe8

          SHA512

          a2394e861de2f9c233e15b945b4c1d5e093d5d1dc49eda986ab9f444aa26d90bfe794415bf055bf004ccf1d66402c4051d6eb457acd505a78ede49ce579c2a41

        • memory/2016-1-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/2016-8-0x0000000000280000-0x0000000000286000-memory.dmp

          Filesize

          24KB

        • memory/2016-0-0x0000000000280000-0x0000000000286000-memory.dmp

          Filesize

          24KB

        • memory/2708-23-0x0000000000310000-0x0000000000316000-memory.dmp

          Filesize

          24KB