Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    21/11/2024, 06:50

General

  • Target

    2024-11-21_76c57a8ee4ffbfcbe340d5a36ea7f693_cryptolocker.exe

  • Size

    38KB

  • MD5

    76c57a8ee4ffbfcbe340d5a36ea7f693

  • SHA1

    822836fb6cc570b9d0c2425fff1809c8d3438003

  • SHA256

    b3969b3231b70d8d770aefdbfb34d2f3927cc1f3937d2226e6a7753f6d0e2582

  • SHA512

    5d2c2483cf1db87bf36597f3cbb46d4f92e9f1c16c2ceceb39308d3172d6949d689fe148177836c09059e503bad74f0c055a52b7837e5d5b6a07784d50513dd7

  • SSDEEP

    768:bAvJCYOOvbRPDEgXrNekd7l94i3pQheDZFc:bAvJCF+RQgJeab4sb8

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-11-21_76c57a8ee4ffbfcbe340d5a36ea7f693_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-11-21_76c57a8ee4ffbfcbe340d5a36ea7f693_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2568
    • C:\Users\Admin\AppData\Local\Temp\demka.exe
      "C:\Users\Admin\AppData\Local\Temp\demka.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2620

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\demka.exe

    Filesize

    39KB

    MD5

    5b3e2093e661710b9230bd56e753e4dd

    SHA1

    387d81eefb0ca4447265eb0c13cd77c7440d3f92

    SHA256

    f69fd7f131a5ab70e4f03f6a97077f0712206754a0af2f23e77ceecd2f3d8c32

    SHA512

    94107037f45e18adb586cbc9354cb5d0c6516970444a672d7b85ba8f1029d43b7e73ddd8ed384bb4ed3cb0c7f3524e2c79f3467f16c54984eaa2346b898d299f

  • memory/2568-0-0x00000000003A0000-0x00000000003A6000-memory.dmp

    Filesize

    24KB

  • memory/2568-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2568-8-0x00000000003A0000-0x00000000003A6000-memory.dmp

    Filesize

    24KB

  • memory/2620-23-0x0000000000270000-0x0000000000276000-memory.dmp

    Filesize

    24KB