Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    01/06/2024, 04:04

General

  • Target

    2024-06-01_f9b64b354cc69da8f9ff111df0383a22_cryptolocker.exe

  • Size

    43KB

  • MD5

    f9b64b354cc69da8f9ff111df0383a22

  • SHA1

    1613a8681e790f8031ae4ac91a6e0c1e39aaf724

  • SHA256

    8784371a7a9cd1b9cf2e0a616244748299bd8380b05333c666c94f70e7d093a4

  • SHA512

    b205d7f5cd88dc558c14752558f86b243ecbabefc0c2b055998e8ef7bed44003fc75c2f284187d73e7b928af5708d1da295a781c21494456504c45dc429bc723

  • SSDEEP

    768:bAvJCYOOvbRPDEgXrNekd7l94i3py/yY/Ji3:bAvJCF+RQgJeab4sy/lo3

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-01_f9b64b354cc69da8f9ff111df0383a22_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-01_f9b64b354cc69da8f9ff111df0383a22_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2388
    • C:\Users\Admin\AppData\Local\Temp\demka.exe
      "C:\Users\Admin\AppData\Local\Temp\demka.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\demka.exe

    Filesize

    44KB

    MD5

    2cf437ef4c224ce813cfb10916df5359

    SHA1

    b5002860c7cc547e666f10b6a04d8cd2c96687a3

    SHA256

    f907763aac38e4ad943b604fb2c38ad8534dd3456751007de2a4a01d3eea9074

    SHA512

    a41c4e992d241390249e20059984cd167bbc2b6d52d4528a3584eb87ef0605f9aadc8027e6a339924e9571caef10eea0f623c6443f2a792f504391aa2bcc528a

  • memory/2388-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2388-0-0x0000000000360000-0x0000000000366000-memory.dmp

    Filesize

    24KB

  • memory/2388-8-0x0000000000360000-0x0000000000366000-memory.dmp

    Filesize

    24KB