Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2024, 01:28 UTC

General

  • Target

    2024-10-02_8ae94bdb6ea88bcd3de203a9e4df07c4_cryptolocker.exe

  • Size

    42KB

  • MD5

    8ae94bdb6ea88bcd3de203a9e4df07c4

  • SHA1

    14139885eabca03ec93d19c051f7185ad0b62213

  • SHA256

    f088472cacc6da47da523a69027a05f5ddc243ab9fb4d972cd9af1d5edca6088

  • SHA512

    6dd1f0bae60005c7efbdb00c42a2182383bcd6f685a5bf59ff6548abf8398ed026b597b4910067902831c6ba8000cdfb626268add2eca406665768382b5b5ef6

  • SSDEEP

    768:bA74zYcgT/Ekd0ryfjPIunqpeNswmT3HwnCk:bA6YcA/X6G0W143Qr

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-02_8ae94bdb6ea88bcd3de203a9e4df07c4_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-02_8ae94bdb6ea88bcd3de203a9e4df07c4_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2180

Network

  • flag-us
    DNS
    mytarta.com
    hasfj.exe
    Remote address:
    8.8.8.8:53
    Request
    mytarta.com
    IN A
    Response
No results found
  • 8.8.8.8:53
    mytarta.com
    dns
    hasfj.exe
    57 B
    130 B
    1
    1

    DNS Request

    mytarta.com

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    43KB

    MD5

    b1c8576acccbf40259c61c82eef1cc96

    SHA1

    543ed5679ffbbd121b9b4f759f347ba653ec864c

    SHA256

    87fe96604cf7a3f0edae1869f7a95531b62e47d05e57ac15f6f5218ae1e3b7a0

    SHA512

    1ed29a9d77090d010d0ea9451302c43ee05e8d9998176d93ecbf421108dc354b897d9e893b9cbd3ae2b0d5bfcf0cec9fd85d892e2df3e72ec3015f5ae09063b7

  • memory/2148-0-0x0000000001CA0000-0x0000000001CA6000-memory.dmp

    Filesize

    24KB

  • memory/2148-1-0x0000000001CB0000-0x0000000001CB6000-memory.dmp

    Filesize

    24KB

  • memory/2148-9-0x0000000001CA0000-0x0000000001CA6000-memory.dmp

    Filesize

    24KB

  • memory/2180-15-0x00000000003A0000-0x00000000003A6000-memory.dmp

    Filesize

    24KB

  • memory/2180-22-0x0000000000390000-0x0000000000396000-memory.dmp

    Filesize

    24KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.