Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    23-01-2024 20:58

General

  • Target

    2024-01-23_c9ec9d23684b2bacb1787be9d5dde2c2_cryptolocker.exe

  • Size

    50KB

  • MD5

    c9ec9d23684b2bacb1787be9d5dde2c2

  • SHA1

    74896f15b499ea00d39215f3884f2ea46950554d

  • SHA256

    464e7236ec21b33ac1593d9e587c7f8f867b240966c60c9b52a7fa0a55bfa1f8

  • SHA512

    81e1c880e27aca8fdf2b33ef9fc71dfdb745af2688efe8b4455413ef8e1cce647011adb99b89ee3db4dc77c5ba9a51e81c397dc84e165df84cb514c82ae4cfaf

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjeJQ7pojaklo1:V6a+pOtEvwDpjF

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-23_c9ec9d23684b2bacb1787be9d5dde2c2_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-23_c9ec9d23684b2bacb1787be9d5dde2c2_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2116
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    50KB

    MD5

    27a2f38dd85183fbc461d1c94754964a

    SHA1

    4e31cf4369058e1da6320bc583a9583e565adc37

    SHA256

    fbb5c73c759451fca3ea4d46aac5b8f9366042335bf9d90e827ef622dd9ed040

    SHA512

    8bd1ac8dff4ecb1ce8c6b865c698dc8e65ff6891978d454096a8f3bb555ab16b21be3d24768f992ff3f3315c52fb0f8ad219026c5a96d469c4ae0217488f3056

  • memory/2116-1-0x0000000000200000-0x0000000000206000-memory.dmp

    Filesize

    24KB

  • memory/2116-3-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2116-0-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2624-15-0x00000000002B0000-0x00000000002B6000-memory.dmp

    Filesize

    24KB

  • memory/2624-16-0x00000000002F0000-0x00000000002F6000-memory.dmp

    Filesize

    24KB