Analysis

  • max time kernel
    0s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/01/2024, 12:17

General

  • Target

    2024-01-06_e523b60462840b024bc33860de57ec31_cryptolocker.exe

  • Size

    104KB

  • MD5

    e523b60462840b024bc33860de57ec31

  • SHA1

    a3dbf8930875774cf7c624ececaf3552ff81e897

  • SHA256

    d9c8258a0230fb06897dc7b18ec438773ffabb19e8014e0ab3fbe690d14ab1e1

  • SHA512

    664fa1b0694d4026c7e122d034e1260d5247c079f61ebedc076fc26bfa4e736d298ae770127ce6328004023cf3b783fad9602f1f020688b3dee3d6a550098ef0

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6Gksg5:1nK6a+qdOOtEvwDpjC

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-06_e523b60462840b024bc33860de57ec31_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-06_e523b60462840b024bc33860de57ec31_cryptolocker.exe"
    1⤵
      PID:2052
      • C:\Users\Admin\AppData\Local\Temp\asih.exe
        "C:\Users\Admin\AppData\Local\Temp\asih.exe"
        2⤵
          PID:4952

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\asih.exe

        Filesize

        104KB

        MD5

        04180064692b70ec2b63c0cee04084a4

        SHA1

        79206fedad82c35aa95e66fb29cd3cc81e72617f

        SHA256

        81cf69244d9c4d802eb17254ece567c5e6760a702cafd073bb7a2046686a27b5

        SHA512

        e7865f56dcb6ea21412eae228fb40d66bada59c4e37965cb82cd167544ec3377c506027baf972c5149772b5e8d465dbb7852465ecc0732f2813c24025ab49937

      • memory/2052-0-0x0000000000500000-0x000000000050F311-memory.dmp

        Filesize

        60KB

      • memory/2052-2-0x00000000006F0000-0x00000000006F6000-memory.dmp

        Filesize

        24KB

      • memory/2052-3-0x0000000000710000-0x0000000000716000-memory.dmp

        Filesize

        24KB

      • memory/2052-1-0x00000000006F0000-0x00000000006F6000-memory.dmp

        Filesize

        24KB

      • memory/2052-17-0x0000000000500000-0x000000000050F311-memory.dmp

        Filesize

        60KB

      • memory/4952-19-0x0000000001F80000-0x0000000001F86000-memory.dmp

        Filesize

        24KB

      • memory/4952-22-0x00000000004E0000-0x00000000004E6000-memory.dmp

        Filesize

        24KB

      • memory/4952-26-0x0000000000500000-0x000000000050F311-memory.dmp

        Filesize

        60KB