Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25/01/2024, 21:26

General

  • Target

    2024-01-25_cdda5994d9edaac863657e2788c42d45_cryptolocker.exe

  • Size

    38KB

  • MD5

    cdda5994d9edaac863657e2788c42d45

  • SHA1

    7399c25deb81eb3cf36fb7cf3deaea1d53654599

  • SHA256

    665bc86a9a0d4fc9c6bf5ab574f31e387403b0447d851d90d6abe74cc3cf8ff9

  • SHA512

    c4ed329ecb9c3238378d6b871a506eb8db3aa53ea7a985e054749621f3be831fe659210f0888af9ae63fb59b0a7756c6ce106380c34f501c7350aeea4855f773

  • SSDEEP

    384:e/4wODQkzonAYsju5N/surDQtOOtEvwDpjqIGROqS/Wcz0BVFC:79inqyNR/QtOOtEvwDpjBKcmq

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-25_cdda5994d9edaac863657e2788c42d45_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-25_cdda5994d9edaac863657e2788c42d45_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:1704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    38KB

    MD5

    6ee4e9d82bfe43fc2c06ec9c2a526f90

    SHA1

    4bec7177a75d2b2f6f56ec32305e39d6df607f75

    SHA256

    a4d29ae012ba47c77f0061126426f1dbfa8d405743cd7fa171d81595d0b4da69

    SHA512

    723087ebd61a3088eb9fd7d5ae87deea6390d257869912f77acd3608dddef515cb580bc43838c69f961b23fb1cc9f799cfa73206d8580f1524b05ddec2990eba

  • memory/1704-18-0x0000000000290000-0x0000000000296000-memory.dmp

    Filesize

    24KB

  • memory/1704-17-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/1704-20-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2024-0-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/2024-1-0x0000000000600000-0x0000000000606000-memory.dmp

    Filesize

    24KB

  • memory/2024-3-0x0000000000600000-0x0000000000606000-memory.dmp

    Filesize

    24KB

  • memory/2024-2-0x00000000008D0000-0x00000000008D6000-memory.dmp

    Filesize

    24KB

  • memory/2024-15-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB