Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/01/2024, 23:24

General

  • Target

    2024-01-24_5ef70b0acb507a1c8e12256253295059_cryptolocker.exe

  • Size

    47KB

  • MD5

    5ef70b0acb507a1c8e12256253295059

  • SHA1

    b5ef918391b6e8b4ba6b26209c7888ca898bb213

  • SHA256

    a09f8c1d530c0b7589077616a8f1ae32fd97c2b0d2b9e7bfaf405964e4a41a01

  • SHA512

    f6e9590c351261012f8938ef99344115f7f5366f87b12b3daab7b68a370c8bc0c83574676a623d34192201ad5ac0a57c55204667fb4b2f21a264cb37e6e6b677

  • SSDEEP

    768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpjeJQ7suIlsw92KFXckdBX:V6QFElP6n+gMQMOtEvwDpjeJQ7pojakj

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-24_5ef70b0acb507a1c8e12256253295059_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-24_5ef70b0acb507a1c8e12256253295059_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1228
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2300

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          47KB

          MD5

          28e472d253511645d1d4d0ea2ed1bdaa

          SHA1

          f2bddc438abd6ad17e150f7a845b73ee5a7b75cf

          SHA256

          05aed5b404af76bf968c23eb897d647d6e1ead94f08dcc9bb98c64bf12db489c

          SHA512

          64a76a5b1d9f73a1e815b1e82a028a5e0eb9e3a4a3de0ac791a5357879d342e6faceaef2c7dff16805dc401ca72375325948b18cfeedca32071f6c02212a0264

        • memory/1228-0-0x0000000000420000-0x0000000000426000-memory.dmp

          Filesize

          24KB

        • memory/1228-1-0x0000000000420000-0x0000000000426000-memory.dmp

          Filesize

          24KB

        • memory/1228-2-0x0000000000450000-0x0000000000456000-memory.dmp

          Filesize

          24KB

        • memory/2300-16-0x0000000000270000-0x0000000000276000-memory.dmp

          Filesize

          24KB

        • memory/2300-15-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB