Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2024, 00:57

General

  • Target

    2024-10-13_510761c8466ba202c63b996a6450496d_cryptolocker.exe

  • Size

    43KB

  • MD5

    510761c8466ba202c63b996a6450496d

  • SHA1

    745afd259b800c40f60dbbb9ad9da7e9238c8bcf

  • SHA256

    1ed6360b94dcdd8477b3a9e34f8fafa3a928e091e1f38d3f7fa060bb16362955

  • SHA512

    b8918ab22b0197c1ddddd18103d08ad4e38e3b2c90cb6e5ef969fbd91fb2ae901e97fd3a26259d5955feb6adecd295f182bce6245275bfa1305c694d65661a52

  • SSDEEP

    768:bgX4zYcgTEu6QOaryfjqDlC6JFbK37YlNq3:bgGYcA/53GAA6y37Qo3

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-13_510761c8466ba202c63b996a6450496d_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-13_510761c8466ba202c63b996a6450496d_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2136
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1652

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\hasfj.exe

          Filesize

          43KB

          MD5

          946c3a0d17a38dd264ddf96844128250

          SHA1

          3266404c8b273daa309b9e066e2e4b6b8ec17a9d

          SHA256

          6f7d53c5a1c373d3e408b9cd55538fa44af3b9d4022d46c2cb038bc05eff66cf

          SHA512

          3e17eae10304aab7bbc5c4fe780fde2c9c7416ec5ea1e5fe516512c83d442b7deae442be46ae92b26044b9693fa647e5ad420fdc61415a9a2c43215385fb3d99

        • memory/1652-15-0x00000000002E0000-0x00000000002E6000-memory.dmp

          Filesize

          24KB

        • memory/1652-22-0x0000000000290000-0x0000000000296000-memory.dmp

          Filesize

          24KB

        • memory/2136-0-0x0000000001CA0000-0x0000000001CA6000-memory.dmp

          Filesize

          24KB

        • memory/2136-8-0x0000000001CA0000-0x0000000001CA6000-memory.dmp

          Filesize

          24KB

        • memory/2136-1-0x0000000001CF0000-0x0000000001CF6000-memory.dmp

          Filesize

          24KB