Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    01/06/2024, 13:03

General

  • Target

    2024-06-01_99a0c647e996a329c0a69c6573ca306a_cryptolocker.exe

  • Size

    43KB

  • MD5

    99a0c647e996a329c0a69c6573ca306a

  • SHA1

    9487e9901a0e0c611b597fcc27770c953fe10173

  • SHA256

    eb38dbe99f77661b2de7609336efb435a4b61338d34150b702442312b8193950

  • SHA512

    dd5f470d15a01a755f03539ed147f2bea1d760e6102ed07f2362aa5431638bf7a168ba9c51c0c3737928a2b10ad0dca482a2a125a0edcc5308cd5c8e8c95eba3

  • SSDEEP

    384:bm74uGLLQRcsdeQ72ngEr4K7YmE8jo0nrlwfjDUwt:bm74zYcgT/Ekn0ryfjZt

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-01_99a0c647e996a329c0a69c6573ca306a_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-01_99a0c647e996a329c0a69c6573ca306a_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1752
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    44KB

    MD5

    9b7a5383e2b756f23caf08f36cf7d993

    SHA1

    f2297ceb58d3ef8ea79127a64504b91bbd9ab3a0

    SHA256

    a137ca30dedd138644d89f31885b9262902b12c9160ff7f47fdf9673ea3188b9

    SHA512

    76f844280b591325833c7871df44c2057685504245f6b386d5ae200981761a54350a55d3071b780723f26e0b20b17240aebdbdfc8331cc9e2df03786e5a363dd

  • memory/1752-1-0x00000000004B0000-0x00000000004B6000-memory.dmp

    Filesize

    24KB

  • memory/1752-9-0x00000000004B0000-0x00000000004B6000-memory.dmp

    Filesize

    24KB

  • memory/1752-2-0x00000000004C0000-0x00000000004C6000-memory.dmp

    Filesize

    24KB

  • memory/1752-0-0x0000000008000000-0x000000000800D000-memory.dmp

    Filesize

    52KB

  • memory/1752-16-0x0000000008000000-0x000000000800D000-memory.dmp

    Filesize

    52KB

  • memory/1752-14-0x0000000001EE0000-0x0000000001EED000-memory.dmp

    Filesize

    52KB

  • memory/2680-17-0x0000000008000000-0x000000000800D000-memory.dmp

    Filesize

    52KB

  • memory/2680-26-0x00000000002D0000-0x00000000002D6000-memory.dmp

    Filesize

    24KB

  • memory/2680-19-0x00000000002E0000-0x00000000002E6000-memory.dmp

    Filesize

    24KB

  • memory/2680-27-0x0000000008000000-0x000000000800D000-memory.dmp

    Filesize

    52KB