Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12-09-2024 04:40

General

  • Target

    2024-09-12_77e06c04616b70394343fb99d39b9420_cryptolocker.exe

  • Size

    42KB

  • MD5

    77e06c04616b70394343fb99d39b9420

  • SHA1

    12e61319f6f26b934bea14f5c3da9b9df057cac8

  • SHA256

    2045dcac258f88cf9b2119a293d11bdd592a14c4c8efa081df1e44df5fe08907

  • SHA512

    e8e7fb7f901dbf387ecdbfcfb7acbb28252c6ffea63b07714f7a8d388a99476bb0d8467a8895eee6cdf0007f867d4842613e615984b629729e2fe4b6713f4e82

  • SSDEEP

    768:bA74zYcgT/Ekd0ryfjPIunqpeNswmT3HwnCoq:bA6YcA/X6G0W143Qnq

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-12_77e06c04616b70394343fb99d39b9420_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-12_77e06c04616b70394343fb99d39b9420_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2780

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    42KB

    MD5

    d87ee6dc03f288668fdacd04d454c5ab

    SHA1

    aa9ed988af54672896672506d99b1dc1b9684c35

    SHA256

    2e4582963d59e37b7c5de853052529e15b2ed1d787de079894eed2dc08dd0096

    SHA512

    5737ed70a4b19e6a2120718b72ab4674eac128a2e60c6350c4b28e956537f5d7b08c74f57abb2f38a819c3b881782fba9d170f994bc260bcad8efe41c1330248

  • memory/2080-0-0x0000000000530000-0x0000000000536000-memory.dmp

    Filesize

    24KB

  • memory/2080-1-0x0000000000540000-0x0000000000546000-memory.dmp

    Filesize

    24KB

  • memory/2080-12-0x0000000000530000-0x0000000000536000-memory.dmp

    Filesize

    24KB

  • memory/2780-15-0x0000000002D00000-0x0000000002D06000-memory.dmp

    Filesize

    24KB

  • memory/2780-22-0x0000000002920000-0x0000000002926000-memory.dmp

    Filesize

    24KB