Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24-01-2024 07:52

General

  • Target

    2024-01-24_fe0d194ad04154e07ef0732ba1d8a9ea_cryptolocker.exe

  • Size

    96KB

  • MD5

    fe0d194ad04154e07ef0732ba1d8a9ea

  • SHA1

    aff6d4745c22d4d912d7ff28a7462cee5cf0e179

  • SHA256

    9683cb48eb4f0082d0560835d6273c2e795ffcbef85bbb73fbadcc2705d50851

  • SHA512

    c3f63c6076beebc09fe92af38a58a751c21669d031a1b69d415f262033834d35fc48b2237fbfc3d62cc0d63274fa176750f0a233b3aecce4d99ba85c2bc2379e

  • SSDEEP

    1536:26QFElP6n+gBQMOtEvwDpjQGYQbN/PKwNCJ0:26a+2OtEvwDpjtzB

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-24_fe0d194ad04154e07ef0732ba1d8a9ea_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-24_fe0d194ad04154e07ef0732ba1d8a9ea_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2928
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2332

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    96KB

    MD5

    abab993596ff42af17d140cf2751f205

    SHA1

    b81438f8e10476d38b8a52628b40db0b15a462c1

    SHA256

    e391dc98aeb922f7346ed0d32ee0fc7a22227970a4949a6b3850049f83ddfb0b

    SHA512

    666fc2e79082cd8383de517c12b56dfb9e19f43369ec58369990e032cfd59f3d5d75d7bb1be98c646003eeda29bba3a3794893fc34a0ca4e81e96d0837c6f8db

  • memory/2332-22-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2928-0-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2928-2-0x0000000000290000-0x0000000000296000-memory.dmp

    Filesize

    24KB

  • memory/2928-1-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB