Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    11/08/2024, 20:04

General

  • Target

    2024-08-11_780045ee0a0a12f09977ba8ee11fe628_cryptolocker.exe

  • Size

    392KB

  • MD5

    780045ee0a0a12f09977ba8ee11fe628

  • SHA1

    b9e071911dd5ec791f362a2919fed1c36014bdc5

  • SHA256

    50589eae7bf4cc8b6e1b63746dea08d3f5459ea13e5fdacb07e97d78c16da180

  • SHA512

    9f5fb876c4489cd3b1ffeb5a294a74aa14fa3a8f120c669654c9ea80f35d2114bd3cf8ed1f83e3cb9edd58fb7f4d9133b85eea67c5b03f17052876b712af6c25

  • SSDEEP

    6144:nnOsaQgAOjvrZFODJjBz3j1jTqQy6v2GGnugOtihzXRZ:nnOflT/ZFIjBz3xjTxynGUOUhXRZ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-08-11_780045ee0a0a12f09977ba8ee11fe628_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-08-11_780045ee0a0a12f09977ba8ee11fe628_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3040

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    392KB

    MD5

    0c2c6ece32ff259c31afe8ed9ae58e93

    SHA1

    d2847af0404bf700c8cbe205d3eb0a0031efe33b

    SHA256

    d134189026bad3c01906a732100328eab05987d2b381241622595e2416e1b1b7

    SHA512

    11f7245e7b0a1531825176f8fe75e27964334d26375fd8ced051358fb0f4d5d2c7465667123516a9b03ab33223e60dd74b18b9f3d0bb5ab90a336b50917c9f5b

  • memory/2336-0-0x0000000000480000-0x0000000000486000-memory.dmp

    Filesize

    24KB

  • memory/2336-8-0x0000000000480000-0x0000000000486000-memory.dmp

    Filesize

    24KB

  • memory/2336-1-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/3040-16-0x0000000000360000-0x0000000000366000-memory.dmp

    Filesize

    24KB

  • memory/3040-15-0x0000000000350000-0x0000000000356000-memory.dmp

    Filesize

    24KB