Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 05:32

General

  • Target

    2024-09-19_aa5e8614030c5e0dfbcdaef33e78e40b_cryptolocker.exe

  • Size

    43KB

  • MD5

    aa5e8614030c5e0dfbcdaef33e78e40b

  • SHA1

    571a61c6be4c51046f15af9435b4d4e605f24d17

  • SHA256

    b2a41b59e7e918912579564119d5cce4ba44ef071645ef8d94ab4df479323271

  • SHA512

    dda285b42f4d74953fd0c71b74de20ebd6528a221c9a59722abc1be3d9303627c9f2a0a9322b447ff12cdc46e833d8d96ef26491b662e9476b484ea2dae17dae

  • SSDEEP

    768:bgX4zYcgTEu6QOaryfjqDlC6JFbK37Ybnf5nLn:bgGYcA/53GAA6y37Md

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-19_aa5e8614030c5e0dfbcdaef33e78e40b_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-19_aa5e8614030c5e0dfbcdaef33e78e40b_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2876
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2900

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    43KB

    MD5

    fcdbde332630b1763089c21287487114

    SHA1

    582d574be90b1e8bba8f2fc5be65b6902cba3aa2

    SHA256

    f8865b86edd8ed1307cc125443459da2e0471f67c85f98c892d20a50bdbadfc9

    SHA512

    255a04c92e537dfd4a833839c1803c9cbcb373551e0822429865350d015aa9fc63fce4a76212521453de84af4143716d1d45605e639b9fb8db384a24adec92df

  • memory/2876-0-0x0000000001CA0000-0x0000000001CA6000-memory.dmp

    Filesize

    24KB

  • memory/2876-1-0x0000000001CF0000-0x0000000001CF6000-memory.dmp

    Filesize

    24KB

  • memory/2876-8-0x0000000001CA0000-0x0000000001CA6000-memory.dmp

    Filesize

    24KB

  • memory/2900-15-0x0000000000390000-0x0000000000396000-memory.dmp

    Filesize

    24KB

  • memory/2900-22-0x0000000000380000-0x0000000000386000-memory.dmp

    Filesize

    24KB