Analysis

  • max time kernel
    2s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/01/2024, 05:52

General

  • Target

    2024-01-01_e53e92542efc3577ec5256e41104b25c_cryptolocker.exe

  • Size

    127KB

  • MD5

    e53e92542efc3577ec5256e41104b25c

  • SHA1

    dfbfca9017a4a7ca37c76fa7a37d1bdc7f32c7fc

  • SHA256

    d5f6728915d111b3b7d6618a4f1fed91210a86e3dd8806982595bbf89362034c

  • SHA512

    002bd5995406e3e70882e19d96e5c8ab8b4e7145e1eabff2a2a5009d2c9db961481704699ad5a1c28059493645aaaca298b3e9c836ba353472784e9e3b7a2879

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1eh3:AnBdOOtEvwDpj6zL

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-01_e53e92542efc3577ec5256e41104b25c_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-01_e53e92542efc3577ec5256e41104b25c_cryptolocker.exe"
    1⤵
      PID:1188
      • C:\Users\Admin\AppData\Local\Temp\asih.exe
        "C:\Users\Admin\AppData\Local\Temp\asih.exe"
        2⤵
          PID:3664

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\asih.exe

        Filesize

        40KB

        MD5

        a0458ca08632b618b607200d9ae14fa0

        SHA1

        7d2a0381b48f35ad050dc67764e2eab98973d78e

        SHA256

        258c33ef3adccf4bd604393c912e2df69a552814a6ce5ff5f2c75097119d29a9

        SHA512

        28f0b542d75341756f6e1a6b8d2c656c640b0bae3debf92764e01e77fbcfc26680fbcfd6d52911103c2e47a915e5dbb73e8ab80079b56ffaaa5866c0db74d14a

      • C:\Users\Admin\AppData\Local\Temp\asih.exe

        Filesize

        13KB

        MD5

        f3737f394fbc83af8c67778986972c85

        SHA1

        908160aac8e79f855a8421672b27cbf924188eeb

        SHA256

        e3752f11895a35bce3c099012073ffccbea0cd587de3250596117713f2b03c87

        SHA512

        2cbbe8bf03f3ed755a0450552e9d7921bc800a5a30cfeda918247800ee3db95ed7f3d4bd85806aee04debbd27e932d8470e558ee71e738e2eb51d0ef67b2bc26

      • C:\Users\Admin\AppData\Local\Temp\asih.exe

        Filesize

        46KB

        MD5

        37e6afda5ce079bd5cb4682e37640061

        SHA1

        f1e3d32e9e79af62de5bc16f8f198408402a65e4

        SHA256

        9ab59702534738a19f72e7680b21e6077a95efa127c99314f0afbecec6264a72

        SHA512

        d331ae3d166c304f88bb7d28ff77a0b98720720549f7f6f6941bb893f0cc8e7a29df532a9ba1c34a517b86d2c91bf638aa93b634488b261bad9d63cf08a53f7e

      • memory/1188-0-0x0000000000500000-0x000000000050F000-memory.dmp

        Filesize

        60KB

      • memory/1188-1-0x00000000004D0000-0x00000000004D6000-memory.dmp

        Filesize

        24KB

      • memory/1188-3-0x00000000004F0000-0x00000000004F6000-memory.dmp

        Filesize

        24KB

      • memory/1188-2-0x00000000004D0000-0x00000000004D6000-memory.dmp

        Filesize

        24KB

      • memory/1188-22-0x0000000000500000-0x000000000050F000-memory.dmp

        Filesize

        60KB

      • memory/3664-19-0x0000000002070000-0x0000000002076000-memory.dmp

        Filesize

        24KB

      • memory/3664-21-0x0000000002050000-0x0000000002056000-memory.dmp

        Filesize

        24KB

      • memory/3664-17-0x0000000000500000-0x000000000050F000-memory.dmp

        Filesize

        60KB

      • memory/3664-27-0x0000000000500000-0x000000000050F000-memory.dmp

        Filesize

        60KB