Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29/05/2024, 06:38

General

  • Target

    2024-05-29_707ad8f35093f671790dafdf7a3491be_cryptolocker.exe

  • Size

    44KB

  • MD5

    707ad8f35093f671790dafdf7a3491be

  • SHA1

    e837da4b8b643cc7acff31c3c2f5f6ef2269891b

  • SHA256

    a397c1dc15de721d5f83ff6540019ac966111852cc2744f0e57efb8f6c470eec

  • SHA512

    8506794f1de656ac5742f43446a1a1cbb97c9743ac87621030a4ee5a63481fd4ff9369adaad6c5fbae031a46a755e087b3d3af41d59e6bc388160e71bb7f8aa6

  • SSDEEP

    384:bm74uGLLQRcsdeQ72ngEr4K7YmE8jb0nrlwfjDUki:bm74zYcgT/EkM0ryfjdi

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-29_707ad8f35093f671790dafdf7a3491be_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-29_707ad8f35093f671790dafdf7a3491be_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2740
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2484

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\hasfj.exe

          Filesize

          44KB

          MD5

          58b3e67461bc7c5c427ad73c5e82dd4b

          SHA1

          05b791a5e7e833d73db24ddcf3ffac85aaeb9800

          SHA256

          55a0e7bbeb2cd887a23ec64513b281c3018ff29be118393d80c80b2d1667cc5d

          SHA512

          c34bd130c3dd5ed48d11af6b70a78f6b585aac5e5dc0112f9ead4842f345383679ea425353aee4f7de87dc1b19085dc1530a432cd0346f2d05b11040214eb6d9

        • memory/2484-17-0x0000000008000000-0x000000000800D000-memory.dmp

          Filesize

          52KB

        • memory/2484-26-0x0000000001C80000-0x0000000001C86000-memory.dmp

          Filesize

          24KB

        • memory/2484-19-0x0000000001CA0000-0x0000000001CA6000-memory.dmp

          Filesize

          24KB

        • memory/2484-28-0x0000000008000000-0x000000000800D000-memory.dmp

          Filesize

          52KB

        • memory/2740-0-0x0000000008000000-0x000000000800D000-memory.dmp

          Filesize

          52KB

        • memory/2740-1-0x0000000000360000-0x0000000000366000-memory.dmp

          Filesize

          24KB

        • memory/2740-9-0x0000000000360000-0x0000000000366000-memory.dmp

          Filesize

          24KB

        • memory/2740-2-0x0000000000380000-0x0000000000386000-memory.dmp

          Filesize

          24KB

        • memory/2740-15-0x0000000002DF0000-0x0000000002DFD000-memory.dmp

          Filesize

          52KB

        • memory/2740-14-0x0000000008000000-0x000000000800D000-memory.dmp

          Filesize

          52KB

        • memory/2740-27-0x0000000002DF0000-0x0000000002DFD000-memory.dmp

          Filesize

          52KB