Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 05:24

General

  • Target

    2024-09-19_1454b30eb3ddfedb80c4300ff78ad5fa_cryptolocker.exe

  • Size

    46KB

  • MD5

    1454b30eb3ddfedb80c4300ff78ad5fa

  • SHA1

    9c7dc3c2bde0a2552d00776a18d5daf30b239db4

  • SHA256

    6551fc8c91d62850258ca5c119b8d65e4c071894a29ead4f744ce49c9e33020c

  • SHA512

    866960e671e2c6de0913b4ed03b1e7ee8c5a7f6f74901fadc504cd6c0888b7a86314d8e4f6b31de2a6bce8eb3f6055fa0f304341e4ad38106d87d01f4808a563

  • SSDEEP

    384:bm74uGLLQRcsdeQ72ngEr4K7YmE8jo0nrlwfjDUIDtbW:bm74zYcgT/Ekn0ryfjvtbW

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-19_1454b30eb3ddfedb80c4300ff78ad5fa_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-19_1454b30eb3ddfedb80c4300ff78ad5fa_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2256
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    46KB

    MD5

    c8902be936fc0fb8ae5a9b36143b7fd6

    SHA1

    421665b785d2064e6cf0b3f9dfdd7804d17e1372

    SHA256

    38be63523192db602720ef2a7d8ae0f335478fab2e4872fc16dc05fca6061aae

    SHA512

    eee6765a37564202ba1025712f0d3285a00d396532b3f03ff214826a3dc943050a249764a240b531caddbc0fa9423748d9a877f894cbe95d9d741e65e5c9fe3d

  • memory/2256-0-0x0000000008000000-0x000000000800D000-memory.dmp

    Filesize

    52KB

  • memory/2256-1-0x0000000001CE0000-0x0000000001CE6000-memory.dmp

    Filesize

    24KB

  • memory/2256-2-0x0000000001CF0000-0x0000000001CF6000-memory.dmp

    Filesize

    24KB

  • memory/2256-9-0x0000000001CE0000-0x0000000001CE6000-memory.dmp

    Filesize

    24KB

  • memory/2256-13-0x00000000032B0000-0x00000000032BD000-memory.dmp

    Filesize

    52KB

  • memory/2256-16-0x0000000008000000-0x000000000800D000-memory.dmp

    Filesize

    52KB

  • memory/2708-17-0x0000000008000000-0x000000000800D000-memory.dmp

    Filesize

    52KB

  • memory/2708-19-0x0000000000330000-0x0000000000336000-memory.dmp

    Filesize

    24KB

  • memory/2708-26-0x0000000000320000-0x0000000000326000-memory.dmp

    Filesize

    24KB

  • memory/2708-27-0x0000000008000000-0x000000000800D000-memory.dmp

    Filesize

    52KB