Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-01-2024 14:42

General

  • Target

    2024-01-25_7d406da2020a1868f2b0eafeeb002ecf_cryptolocker.exe

  • Size

    49KB

  • MD5

    7d406da2020a1868f2b0eafeeb002ecf

  • SHA1

    76db7abf5c64794e72ce62f80a80c9500827e5fd

  • SHA256

    46ce507ff575663f230c2b6b8502bd5d3c79dd53cebafd5c263710e0f0aaba07

  • SHA512

    98a24716fa2d40b254073ac1b158c35256b2de8b09710a2ad8b8510bca0a28bf46ebde051322d64766da588c4c4f08c689ba24e167e3da64ba4566eb0384c50d

  • SSDEEP

    768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpjeJQ7suIlsw92KFXpQenh/pX:V6QFElP6n+gMQMOtEvwDpjeJQ7pojkmX

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-25_7d406da2020a1868f2b0eafeeb002ecf_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-25_7d406da2020a1868f2b0eafeeb002ecf_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1628
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    50KB

    MD5

    56d3516fff46f393ac78567783ab64e6

    SHA1

    3a51c05fd844e0b5131ecf14d0cc7b8f0aa0f653

    SHA256

    ef52777ab9d98d76d8d39145f3a787432e643a3127505d911d62b1ba036a0491

    SHA512

    832ac5982d0611fda62537dd1fb04c17645adc82788761b399d508697fa9ead4be85cbea3fc03bfb031cadde09bd3657636786de547f98cdba8e739a9504b5ab

  • memory/1628-0-0x00000000001C0000-0x00000000001C6000-memory.dmp

    Filesize

    24KB

  • memory/1628-2-0x00000000001C0000-0x00000000001C6000-memory.dmp

    Filesize

    24KB

  • memory/1628-1-0x0000000000270000-0x0000000000276000-memory.dmp

    Filesize

    24KB

  • memory/2868-15-0x0000000000290000-0x0000000000296000-memory.dmp

    Filesize

    24KB

  • memory/2868-17-0x00000000001E0000-0x00000000001E6000-memory.dmp

    Filesize

    24KB