Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 03:46

General

  • Target

    2024-09-19_f1b7c22da3201d46579527ecbd42a41e_cryptolocker.exe

  • Size

    42KB

  • MD5

    f1b7c22da3201d46579527ecbd42a41e

  • SHA1

    a497239abc0e710633985a137cdcd95d83b451db

  • SHA256

    6884e7c7923b6705cbd85ac9b7d90310b8103d29610f8dccf3a889b179812132

  • SHA512

    7af78161978993f94dae5b66f22416d32e4367dcb15074ee1cc772cbefc4fbb80387d7fe9ff7ab4e18edb59da1619e53f0109b257584aff354042242eef9ba12

  • SSDEEP

    768:bA74zYcgT/Ekd0ryfjPIunqpeNswmT3HwnCi:bA6YcA/X6G0W143QZ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-19_f1b7c22da3201d46579527ecbd42a41e_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-19_f1b7c22da3201d46579527ecbd42a41e_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2748
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2960

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    43KB

    MD5

    516b75d37e7488df128326d18a930cbf

    SHA1

    6749143aa14dec791be3f22c780f8035b27a9d16

    SHA256

    3fce949adaac4900d67ad053c040b43e286e6df9067e1c83d240e7d961047fc5

    SHA512

    c4d577a150393039a42318b4eb6c0a42127281bc4da790f2d8c7005a318366440a972b1400145a402a78ff877d186689410ed78f763b3469774f5e6dd30d7962

  • memory/2748-0-0x00000000002A0000-0x00000000002A6000-memory.dmp

    Filesize

    24KB

  • memory/2748-1-0x00000000002B0000-0x00000000002B6000-memory.dmp

    Filesize

    24KB

  • memory/2748-12-0x00000000002A0000-0x00000000002A6000-memory.dmp

    Filesize

    24KB

  • memory/2960-15-0x00000000005B0000-0x00000000005B6000-memory.dmp

    Filesize

    24KB

  • memory/2960-16-0x00000000005C0000-0x00000000005C6000-memory.dmp

    Filesize

    24KB