Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    20/11/2024, 03:22

General

  • Target

    2024-11-20_07efedf57f3ba59cb1f21811b2c75127_cryptolocker.exe

  • Size

    34KB

  • MD5

    07efedf57f3ba59cb1f21811b2c75127

  • SHA1

    98638beba81a48b27e9ea99c925de406fd118649

  • SHA256

    ea2c9bca41b40af03705766748260a50120060556f28a71b5f038e6f64c15f0e

  • SHA512

    0d97ef71874fa57bfaa0370752c22e6f486be653a4455fa992759dabbc6e8a6294d8787871619c9257fd21a2eb7ec1cb1e42711d6db3c1094969fff57bf6f60f

  • SSDEEP

    384:bG74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUGTGXuaD:bG74zYcgT/Ekd0ryfj6

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-11-20_07efedf57f3ba59cb1f21811b2c75127_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-11-20_07efedf57f3ba59cb1f21811b2c75127_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2580
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    34KB

    MD5

    c8b430951ff518364629785d1519aa80

    SHA1

    383b1e6b959233ee0f1d82d4b9d2148e957a5abb

    SHA256

    6929e1e677a0ca7bf1c433b6f6020e82fb395d56b383754c93858f2580966ad2

    SHA512

    4b7b52eacd7687d880297a8ef36b2ef77cd1df6c5d7716d9aa8d38992c1a62aa55bc3cc54c3d12d06b5ffc3b770d5df19f91f18f4c611a0c2bf9cb89f4e05921

  • memory/2580-0-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/2580-2-0x0000000000310000-0x0000000000316000-memory.dmp

    Filesize

    24KB

  • memory/2580-1-0x00000000002F0000-0x00000000002F6000-memory.dmp

    Filesize

    24KB

  • memory/2580-9-0x00000000002F0000-0x00000000002F6000-memory.dmp

    Filesize

    24KB

  • memory/2580-15-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/2824-17-0x00000000002A0000-0x00000000002A6000-memory.dmp

    Filesize

    24KB

  • memory/2824-24-0x0000000000200000-0x0000000000206000-memory.dmp

    Filesize

    24KB

  • memory/2824-25-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB