Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    27/06/2024, 10:25

General

  • Target

    2024-06-27_3198eaeec4fe00620a22e3dd076f243a_cryptolocker.exe

  • Size

    46KB

  • MD5

    3198eaeec4fe00620a22e3dd076f243a

  • SHA1

    f5dcfbc2f01e65578c8cf57351ebd0a70376949b

  • SHA256

    805aa49b2408090b7d2252dea766b0100efcabc45d45d18ad81533eb8c98d14b

  • SHA512

    e1c8986f357dd5ea5c1f77ce5861f7b9402f001944ef923adb1707166ab0b8ff13c281ef73d2c2a56ad422ba07cb69621a5d8f302da35b204535a519944d1129

  • SSDEEP

    384:bm74uGLLQRcsdeQ72ngEr4K7YmE8jb0nrlwfjDUadQC8w:bm74zYcgT/EkM0ryfjPdQZw

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-27_3198eaeec4fe00620a22e3dd076f243a_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-27_3198eaeec4fe00620a22e3dd076f243a_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1760
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2616

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\hasfj.exe

          Filesize

          46KB

          MD5

          fecb99ef223e196051509f3524a0e7b7

          SHA1

          32e9f7d209b971ced7fac245cdfd489af04395c9

          SHA256

          ebb3e6d0c5607a5d265c1b6da7f078c58bb08c8ef6be2a4f7056b730797cd7c5

          SHA512

          c91fb2b6be9a99295b4aceba7a54f11dbfd9102129241a3b9f6c46eed31a1cddc34ceb13448addc62dca37ebdf596f1b2514eb46e9401572d6f27558f479cd03

        • memory/1760-0-0x0000000008000000-0x000000000800D000-memory.dmp

          Filesize

          52KB

        • memory/1760-2-0x0000000001CB0000-0x0000000001CB6000-memory.dmp

          Filesize

          24KB

        • memory/1760-9-0x0000000001CA0000-0x0000000001CA6000-memory.dmp

          Filesize

          24KB

        • memory/1760-1-0x0000000001CA0000-0x0000000001CA6000-memory.dmp

          Filesize

          24KB

        • memory/1760-15-0x0000000008000000-0x000000000800D000-memory.dmp

          Filesize

          52KB

        • memory/2616-17-0x00000000002B0000-0x00000000002B6000-memory.dmp

          Filesize

          24KB

        • memory/2616-24-0x00000000002A0000-0x00000000002A6000-memory.dmp

          Filesize

          24KB

        • memory/2616-25-0x0000000008000000-0x000000000800D000-memory.dmp

          Filesize

          52KB