Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    09-01-2024 06:35

General

  • Target

    2024-01-08_030661028035c81fbb08954f85c42057_cryptolocker.exe

  • Size

    92KB

  • MD5

    030661028035c81fbb08954f85c42057

  • SHA1

    a68769d4d81ed1e76637b5f9f01ed63903890d56

  • SHA256

    fca8268ba17843a267198d6ef5b487dbb70c65d41bec9b81983c43630091bee8

  • SHA512

    0f85b4eb0d4c85dcfa4833fd12e7d51d0419893bce4a5d0bbfab136610f0bbdb43ec00df1883a69b77740685fe50189b33f48bb3c13ad57fdd7dedc0e64656d2

  • SSDEEP

    1536:26QFElP6n+gBQMOtEvwDpjQGYQbN/PKwNC7:26a+2OtEvwDpjtzQ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-08_030661028035c81fbb08954f85c42057_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-08_030661028035c81fbb08954f85c42057_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:688
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2364

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    92KB

    MD5

    3ad4425a2b9b76521ddb39f7ac669b7d

    SHA1

    0b062de1979b1c826ac12dbf5f15136693f1205c

    SHA256

    271a5c1f6267067859653e813893b09ab142e9641af67d658341294a432e6f4a

    SHA512

    4bed4d1870fb86b42c2476faa5023656d87f54f7711fed3ae63adea52d67583bed86cbc3b76d68fa68c05b40851f86b0535b4e98e6a08fd62d207b5d99882a85

  • memory/688-0-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/688-1-0x0000000000270000-0x0000000000276000-memory.dmp

    Filesize

    24KB

  • memory/688-2-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2364-15-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB

  • memory/2364-16-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB