Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    31/05/2024, 00:24

General

  • Target

    2024-05-31_27a10f80646c11b44ecdfc0b680150b5_cryptolocker.exe

  • Size

    43KB

  • MD5

    27a10f80646c11b44ecdfc0b680150b5

  • SHA1

    836b219e77dd8612b9a850cc583a71db9b54a9f2

  • SHA256

    ba2e32d959fe03502966c7355679d78527207516b70c58a613e1614e325e2aeb

  • SHA512

    e4ca2b47425e2acd1c58f9532fa4d6479864748776faca01fc72344e5096d676d2d046a20f387ad8c21ee0db38a93e9ac12fd1b9271276d1c536cb583c1dac78

  • SSDEEP

    384:bm74uGLLQRcsdeQ72ngEr4K7YmE8jb0nrlwfjDUkw:bm74zYcgT/EkM0ryfjdw

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 6 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-31_27a10f80646c11b44ecdfc0b680150b5_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-31_27a10f80646c11b44ecdfc0b680150b5_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2772
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    43KB

    MD5

    a3941d5460821632b2eccca37d3e56c4

    SHA1

    2b3f89a7773a4a2765272d63907d43b7faec3180

    SHA256

    a602adbb7a098764fcbb7fe2cc42dcd6613f228ef4b1292709f5ba2569af8a44

    SHA512

    bf2c5bd040dc475eb05bddf1c0bec6128d5502b8f82881d45ff29ab8e3bfdfab9f796b302cc77d14a43dd9d9fced6a3c7710c4b5c481de0377e5c45f1b126853

  • memory/2772-0-0x0000000008000000-0x000000000800D000-memory.dmp

    Filesize

    52KB

  • memory/2772-8-0x0000000000450000-0x0000000000456000-memory.dmp

    Filesize

    24KB

  • memory/2772-2-0x0000000001CA0000-0x0000000001CA6000-memory.dmp

    Filesize

    24KB

  • memory/2772-1-0x0000000000450000-0x0000000000456000-memory.dmp

    Filesize

    24KB

  • memory/2772-14-0x0000000001E20000-0x0000000001E2D000-memory.dmp

    Filesize

    52KB

  • memory/2772-16-0x0000000008000000-0x000000000800D000-memory.dmp

    Filesize

    52KB

  • memory/2912-17-0x0000000008000000-0x000000000800D000-memory.dmp

    Filesize

    52KB

  • memory/2912-19-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB

  • memory/2912-26-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB

  • memory/2912-27-0x0000000008000000-0x000000000800D000-memory.dmp

    Filesize

    52KB