Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    23/01/2024, 19:03

General

  • Target

    2024-01-23_f7ebddde3e8b8f0b8860c1676b4cac9f_cryptolocker.exe

  • Size

    73KB

  • MD5

    f7ebddde3e8b8f0b8860c1676b4cac9f

  • SHA1

    9f24f3f241a301b57c3a389f23b21677edb1c963

  • SHA256

    5939af116b3fabf8ced5e365c36a4b821553b8b8ab45a2508281f015c7f07756

  • SHA512

    46d147e516d28ed085b6fdc622ca7a035d51a98d733e5446eadb2abfdd3967fabea0bd667a241ebd2fd59d8e4798fcb74e29fd70273b1b076b81a94a8076d824

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdJcz:T6a+rdOOtEvwDpjNtI

Score
9/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Detection of Cryptolocker Samples 5 IoCs
  • UPX dump on OEP (original entry point) 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-23_f7ebddde3e8b8f0b8860c1676b4cac9f_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-23_f7ebddde3e8b8f0b8860c1676b4cac9f_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2416
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:1200

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    73KB

    MD5

    c73ea959f47cbe1c869ad1170b0a2e81

    SHA1

    fd2894dda41b6521c446078c2813a594d65af2c4

    SHA256

    3a338592230bbe22dae5ad9e5fab890a1fd435e651db28bc2572a6af34615d0b

    SHA512

    d6df94caa7d7502c462a182fd1181575299fdb430ca25e87bed6bb92231520d85b2d05829ffde9d0d323bfa20b0a7025b7dd889d5c43ac185156484e920d888e

  • memory/1200-17-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/1200-19-0x0000000000420000-0x0000000000426000-memory.dmp

    Filesize

    24KB

  • memory/1200-20-0x0000000000450000-0x0000000000456000-memory.dmp

    Filesize

    24KB

  • memory/1200-27-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2416-0-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2416-1-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2416-2-0x0000000000470000-0x0000000000476000-memory.dmp

    Filesize

    24KB

  • memory/2416-3-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2416-13-0x0000000001F20000-0x0000000001F30000-memory.dmp

    Filesize

    64KB

  • memory/2416-15-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB