Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    08/06/2024, 00:31

General

  • Target

    2024-06-08_6032943f85354850966b9743e330e86d_cryptolocker.exe

  • Size

    36KB

  • MD5

    6032943f85354850966b9743e330e86d

  • SHA1

    395a5503db983ff42e5642ef6a104efbafc15381

  • SHA256

    4e4d81a81101880e3f1216ec89a7c3db85e0cbf883875e8060bcbf98d0c95631

  • SHA512

    fa477bc03c27d371084cc27f7d7de26fe582270f630fca3c2eea252c2cdd63b4d6c80d919d6a7f6f716f7df2ca52442c250c1fa6001da2f16feded0715cc4241

  • SSDEEP

    384:bA74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUgIunIVpeNs23mAA6lx1hun:bA74zYcgT/Ekd0ryfjPIunqpeNswm64

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-08_6032943f85354850966b9743e330e86d_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-08_6032943f85354850966b9743e330e86d_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2564

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

          Filesize

          37KB

          MD5

          b6f6607fdd50c04db0773f72c03c4748

          SHA1

          fb2b0ec333b14214b707451cc7ae7d88e48c8e22

          SHA256

          23dee846678c8c4d2d563290c64fdff0f3f4f4b25e2a3246118284fd9e467da9

          SHA512

          f28ed17d45716f5ea2ab0546b7a129448c63dcf8a5fe0d0cf340fa8d0c616cda70a8093506578f90e67d3f30f4594f3cb4a2fecb52dff853ea4ccba0855bfdd5

        • memory/1976-0-0x0000000000570000-0x0000000000576000-memory.dmp

          Filesize

          24KB

        • memory/1976-1-0x0000000000580000-0x0000000000586000-memory.dmp

          Filesize

          24KB

        • memory/1976-8-0x0000000000570000-0x0000000000576000-memory.dmp

          Filesize

          24KB

        • memory/2564-15-0x0000000000790000-0x0000000000796000-memory.dmp

          Filesize

          24KB

        • memory/2564-22-0x0000000000780000-0x0000000000786000-memory.dmp

          Filesize

          24KB