Analysis

  • max time kernel
    294s
  • max time network
    341s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    18/01/2024, 22:39

General

  • Target

    2024-01-18_3dd3c068cbfdfe226280415c7add75ba_cryptolocker.exe

  • Size

    49KB

  • MD5

    3dd3c068cbfdfe226280415c7add75ba

  • SHA1

    2c93f086dcd82e7905a9b0d9da899eb05a50d2c6

  • SHA256

    4e870cce5a3da7d38feff2547a204376e7fabdcd959ed4e8a4e1ae9fa06299df

  • SHA512

    7eb729289b9efa0b8c95b159456beb29c6acd52da4cd47d7a596c91a6e36e0747a06ab785de209abda8dca4af77c24ed6696bd47c729f2c777c9886e95b6358c

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjeJQ7pojaklW:V6a+pOtEvwDpjd

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-18_3dd3c068cbfdfe226280415c7add75ba_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-18_3dd3c068cbfdfe226280415c7add75ba_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1516
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:804

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          50KB

          MD5

          1465b17c4a693a8cdce807416a1e97a0

          SHA1

          1a173dbc0ed4c6b3ca9490769090744de4ecd1c0

          SHA256

          e126427801f6f8b981e0b1414aa90b9991fc997b2ad045fc052989fca9d1d107

          SHA512

          4e57587c3123f53327292a98f78e6646875f682d4252e17a77f70178cc5ea750f349e8a0e27451674e182721e8908ff132132af491347899b0150043b15bad86

        • memory/804-15-0x0000000000270000-0x0000000000276000-memory.dmp

          Filesize

          24KB

        • memory/804-18-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/1516-0-0x00000000001D0000-0x00000000001D6000-memory.dmp

          Filesize

          24KB

        • memory/1516-1-0x0000000000200000-0x0000000000206000-memory.dmp

          Filesize

          24KB

        • memory/1516-2-0x00000000001D0000-0x00000000001D6000-memory.dmp

          Filesize

          24KB