Analysis

  • max time kernel
    144s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    16/06/2024, 17:43

General

  • Target

    2024-06-16_6f55a8a167b1be15ba4bc9b4c3a3a7a3_cryptolocker.exe

  • Size

    45KB

  • MD5

    6f55a8a167b1be15ba4bc9b4c3a3a7a3

  • SHA1

    9bd129a499a6388aed47bff4e43be553d8b5e81d

  • SHA256

    3c0371e1b60f8c6644f134855812236374d8767c0b30d953946ff518fab5194f

  • SHA512

    411e058c93e75cd45deb68a79ffca5f52f69c89650daba3a6bd4d862cda8aeb6e6ee879502f9430b07458ef31a778a614a6a28114f21eccc8a67e1bf1eec8879

  • SSDEEP

    384:bm74uGLLQRcsdeQ72ngEr4K7YmE8jb0nrlwfjDUknqt:bm74zYcgT/EkM0ryfjdnqt

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-16_6f55a8a167b1be15ba4bc9b4c3a3a7a3_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-16_6f55a8a167b1be15ba4bc9b4c3a3a7a3_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3068
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2256

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\hasfj.exe

          Filesize

          45KB

          MD5

          02cd3bffe84de14c0cfc0f5db8168be0

          SHA1

          373af32f2d8c2cbe36f712628e1325ae9e89d738

          SHA256

          0bfccebc17c8ee1c2cfe0ecb36df6643760c0d6d30fed6cfd7acda39937fc2e9

          SHA512

          63e2a2bc9892c3405c42b757237a69f90a8a53ed27b3c2da371a9db4fc12859260c19f2016652ad0c2b8ae5a77743d3deb41419e798c2eb0db34b8ebe5e00b51

        • memory/2256-16-0x0000000008000000-0x000000000800D000-memory.dmp

          Filesize

          52KB

        • memory/2256-18-0x00000000003A0000-0x00000000003A6000-memory.dmp

          Filesize

          24KB

        • memory/2256-25-0x0000000000390000-0x0000000000396000-memory.dmp

          Filesize

          24KB

        • memory/2256-26-0x0000000008000000-0x000000000800D000-memory.dmp

          Filesize

          52KB

        • memory/3068-0-0x0000000008000000-0x000000000800D000-memory.dmp

          Filesize

          52KB

        • memory/3068-2-0x00000000003F0000-0x00000000003F6000-memory.dmp

          Filesize

          24KB

        • memory/3068-9-0x00000000003E0000-0x00000000003E6000-memory.dmp

          Filesize

          24KB

        • memory/3068-1-0x00000000003E0000-0x00000000003E6000-memory.dmp

          Filesize

          24KB

        • memory/3068-15-0x0000000008000000-0x000000000800D000-memory.dmp

          Filesize

          52KB