Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    09-01-2024 06:41

General

  • Target

    2024-01-08_620546cd56816563ccc974bf4fc26286_cryptolocker.exe

  • Size

    58KB

  • MD5

    620546cd56816563ccc974bf4fc26286

  • SHA1

    485a65fd31e0a36fa8341c1468d9c010a30cf6a9

  • SHA256

    41e35329a35fed68ef6a97f932fbfed79815569e38034d32f32c381e2da0896e

  • SHA512

    b475ea918cf4b9a976260aba77378def6fbfdff75e0faa0796c40511c39d9fa64ad0eb8526bd58efcde7bd7fcbf9a6703a1f903b49be79b849836fe284fe4fb4

  • SSDEEP

    768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpj/MLa5VccPt547/GfC:V6QFElP6n+gMQMOtEvwDpjyaLccVCbmC

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-08_620546cd56816563ccc974bf4fc26286_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-08_620546cd56816563ccc974bf4fc26286_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2228
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    58KB

    MD5

    2cde2898b9a9f1f0cd447428af0b1521

    SHA1

    dc74314225b334b7b06c25c3b5e471c7424be979

    SHA256

    9340e6fe8911162b58c85d9fc0cd43d08776e305cf0b8974e28fd2b13c26b589

    SHA512

    d5133913a7d56072a06686488e2f922994f17b7f74300e19d1802b948c51a221d9b3e5c35cfd539cd20c62519531e9838c669bc6276e6aa065f52d85bb5f39c0

  • memory/2228-0-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2228-1-0x0000000000270000-0x0000000000276000-memory.dmp

    Filesize

    24KB

  • memory/2228-3-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB