Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 00:48

General

  • Target

    2024-09-07_16d770bb107c6973b8f62809761bc312_cryptolocker.exe

  • Size

    35KB

  • MD5

    16d770bb107c6973b8f62809761bc312

  • SHA1

    d6e0ec870a63ff3061f1b72a72826ae0623798a8

  • SHA256

    576c07cb54e0ab72d035e02e9025078946baa425d805c89babb589e808446726

  • SHA512

    6bc2db1532a028f3b54ab3efb1de90f79d4d2e173ee57a79593935fe776f911cc37f50efa7abc3c6ad8840225943e0671313352d3a4c9878f2f799c817b6cbab

  • SSDEEP

    384:bG74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUGTGXvJF3SLg:bG74zYcgT/Ekd0ryfjkbCLg

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-07_16d770bb107c6973b8f62809761bc312_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-07_16d770bb107c6973b8f62809761bc312_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:792

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    35KB

    MD5

    ad81f53810390c2b3131d879a9477ddc

    SHA1

    178bc291e995aeb926429540d50e1ef7eb52d87d

    SHA256

    1c04d6c7cd23f822bbf4ba65a77d9efb404160eb85b8d641ddc93e9cb61010aa

    SHA512

    099a2b7521c506e91586f2bf7dcfb7081b17754191d0c7b5c8443873384cf157e6439112532e0695e56e2be601f99d81e67040b55a122eef6459f6377f6953a1

  • memory/792-16-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/792-18-0x0000000000290000-0x0000000000296000-memory.dmp

    Filesize

    24KB

  • memory/792-25-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB

  • memory/792-26-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/1976-0-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/1976-1-0x00000000005C0000-0x00000000005C6000-memory.dmp

    Filesize

    24KB

  • memory/1976-2-0x00000000005D0000-0x00000000005D6000-memory.dmp

    Filesize

    24KB

  • memory/1976-9-0x00000000005C0000-0x00000000005C6000-memory.dmp

    Filesize

    24KB

  • memory/1976-15-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB