Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2024 05:56

General

  • Target

    2024-10-10_a22c5c01ce0f6c110e6e57d12beb24d1_cryptolocker.exe

  • Size

    34KB

  • MD5

    a22c5c01ce0f6c110e6e57d12beb24d1

  • SHA1

    77be097b30eda3c4c1fdbad318f558ddf376c73e

  • SHA256

    7757ceaa8c8454f20b4a8e97f852471ec21ea16c1382384787074e1f4f5dce44

  • SHA512

    e42acb107ed02eb0b0990a0dd1269c917c815cded3b604fb6cfff2ddbc0126c66064b9c21c269146e1c6a1b394344bc76a38b2ee9b3a8935f06c9afc70751b39

  • SSDEEP

    384:bG74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUGTGOFj:bG74zYcgT/Ekd0ryfj7

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-10_a22c5c01ce0f6c110e6e57d12beb24d1_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-10_a22c5c01ce0f6c110e6e57d12beb24d1_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:944
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:480

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    34KB

    MD5

    e680334bded04b855126b35f351a85ff

    SHA1

    ff0a5b904a81b7539b7c21c52037dccb630ee186

    SHA256

    f75d4311cdde4dca9caebce133fae076b2b65b88430db581c300b473438d0286

    SHA512

    75db473b23beb3f2527fd0d3482acbe6c5bbac9307c8a29e38633e40d0dcb83fb19a1948b83ab04c3a4265e1ab57ac6a185ea4b6ff3404db82bf957845838508

  • memory/480-17-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/480-19-0x0000000000500000-0x0000000000506000-memory.dmp

    Filesize

    24KB

  • memory/480-26-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/480-27-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/944-0-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/944-9-0x0000000001CE0000-0x0000000001CE6000-memory.dmp

    Filesize

    24KB

  • memory/944-2-0x0000000001CF0000-0x0000000001CF6000-memory.dmp

    Filesize

    24KB

  • memory/944-1-0x0000000001CE0000-0x0000000001CE6000-memory.dmp

    Filesize

    24KB

  • memory/944-16-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/944-14-0x0000000003330000-0x000000000333A000-memory.dmp

    Filesize

    40KB