Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    03/06/2024, 06:39

General

  • Target

    2024-06-03_9e2d89b8a2b89a98f371b572829f29bd_cryptolocker.exe

  • Size

    45KB

  • MD5

    9e2d89b8a2b89a98f371b572829f29bd

  • SHA1

    9de0190e63d191d6835061b5f36baaa16bb78147

  • SHA256

    45c3e823b6e4bf010b8bdf9f6e66d4c879b54a2f73e4dea900044bbd93fbe3ff

  • SHA512

    6d8776bfeb3390ad78ecb7f9807149ed418f9a32fe606862fd1933b155fc40b724efdb154b0c5de0f0c984a8b64f619f06604dd91d7193347d47ad0783caf054

  • SSDEEP

    384:bm74uGLLQRcsdeQ72ngEr4K7YmE8jb0nrlwfjDUadQC8Y:bm74zYcgT/EkM0ryfjPdQZY

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-03_9e2d89b8a2b89a98f371b572829f29bd_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-03_9e2d89b8a2b89a98f371b572829f29bd_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2228
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2496

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\hasfj.exe

          Filesize

          45KB

          MD5

          891fc24ba0bc291aae146a8b918a3b21

          SHA1

          216aa1069a29aae753ad104f7ab567b7b758d8bf

          SHA256

          f211e36345e212d9bc620481ad9b5b5820b84675274fcf33608caaf5c5234a75

          SHA512

          d927e0329d8559cfe2d53c9d4cc93abca681572ca99c60a0ac08bab306ccf14d9da0602c0971a0d85f8c8111c9a22d54fdcec4bd8498d44516d5c31fa5aec0b8

        • memory/2228-0-0x0000000008000000-0x000000000800D000-memory.dmp

          Filesize

          52KB

        • memory/2228-1-0x0000000000470000-0x0000000000476000-memory.dmp

          Filesize

          24KB

        • memory/2228-9-0x0000000000470000-0x0000000000476000-memory.dmp

          Filesize

          24KB

        • memory/2228-2-0x0000000000480000-0x0000000000486000-memory.dmp

          Filesize

          24KB

        • memory/2228-15-0x0000000008000000-0x000000000800D000-memory.dmp

          Filesize

          52KB

        • memory/2496-16-0x0000000008000000-0x000000000800D000-memory.dmp

          Filesize

          52KB

        • memory/2496-25-0x0000000000370000-0x0000000000376000-memory.dmp

          Filesize

          24KB

        • memory/2496-18-0x0000000000590000-0x0000000000596000-memory.dmp

          Filesize

          24KB

        • memory/2496-26-0x0000000008000000-0x000000000800D000-memory.dmp

          Filesize

          52KB