Analysis

  • max time kernel
    133s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    11/01/2024, 05:48

General

  • Target

    2024-01-10_30e550fd687e51bcae0befcd17c9ae26_cryptolocker.exe

  • Size

    48KB

  • MD5

    30e550fd687e51bcae0befcd17c9ae26

  • SHA1

    62f503e9a5c166d9969e06161644c8812a463367

  • SHA256

    838f02caae05ccd20dfee217a65c3ab28ce6068107f69d0d609d13e005c2ad61

  • SHA512

    bfeb17c8147f13345c3495aeb1406fa270349c9099897639630b46b7fd2f5560526ece03e014be306b3eaa907cc761a56c07de4b5f56f24453b8ae99d57bbb84

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/BtOOtEvwDpjBVaD3E09vaTjpPB:X6QFElP6n+gJBMOtEvwDpjBtECPB

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-10_30e550fd687e51bcae0befcd17c9ae26_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-10_30e550fd687e51bcae0befcd17c9ae26_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2396

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          48KB

          MD5

          875b3b7241a93843efee090f79e67e6f

          SHA1

          03d3ab5ffe881b2315ed986a23ef969549e97c79

          SHA256

          c869a989f462ed3a15c1104a8926a4af5595620857b1ed0fe77e3a8c67b6c3b9

          SHA512

          231a81ca42ee19d3ef3e816df9564d1b49a09b30165765fa49f95c8e07e5b9c46b8d5fd1915015d1d672d2d68dea80084be37b9e4ab06ea5a593109e0dd38a23

        • memory/1712-0-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/1712-2-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/1712-1-0x0000000000270000-0x0000000000276000-memory.dmp

          Filesize

          24KB

        • memory/2396-15-0x00000000003F0000-0x00000000003F6000-memory.dmp

          Filesize

          24KB

        • memory/2396-22-0x0000000000250000-0x0000000000256000-memory.dmp

          Filesize

          24KB