Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28/05/2024, 19:33

General

  • Target

    2024-05-28_cdd367f54defa08bb2d06312a286195c_cryptolocker.exe

  • Size

    37KB

  • MD5

    cdd367f54defa08bb2d06312a286195c

  • SHA1

    65c37b5badb85f635f9d6e7b1bcf43673ee0ee43

  • SHA256

    1f5a63fe040b636bad74de816d10f39881ac1084cc4a3d3e5dce2425e2d04f47

  • SHA512

    e19fac088dbe64e8d9d0349661936943700d16cebcdbd3a79129fff1351a9f2f50c499912b35a709332f9e9ebe093ecddbfd76b30f72bad11a51e11aea1f6cd5

  • SSDEEP

    384:bA74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUgIunexRlSrxV1PVGjD:bA74zYcgT/Ekd0ryfjPIunYwfPVyD

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-28_cdd367f54defa08bb2d06312a286195c_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-28_cdd367f54defa08bb2d06312a286195c_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:1284

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\hasfj.exe

          Filesize

          37KB

          MD5

          55a72d69cb412a3ee64d181a730385e4

          SHA1

          913ebd7808eaba30693d60d5d14b40e90e316fec

          SHA256

          40736340c1393539b023fbeb58e1ede498182d3177e7a82273a95b4bc5694f14

          SHA512

          ddd0e547580e3ba6680b14ae1df2250232d3432ff1ed1e047eb67479881fb66cd165dc0ce41587f627cc237715864f391b4f012707c795c40db49c3405b2cf0a

        • memory/1284-15-0x0000000002D00000-0x0000000002D06000-memory.dmp

          Filesize

          24KB

        • memory/1284-22-0x0000000002920000-0x0000000002926000-memory.dmp

          Filesize

          24KB

        • memory/2240-0-0x0000000000310000-0x0000000000316000-memory.dmp

          Filesize

          24KB

        • memory/2240-1-0x0000000000310000-0x0000000000316000-memory.dmp

          Filesize

          24KB

        • memory/2240-2-0x0000000000330000-0x0000000000336000-memory.dmp

          Filesize

          24KB