Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-01-2024 17:44

General

  • Target

    2024-01-25_2a19eede904690a3381a9cf82e1745b3_cryptolocker.exe

  • Size

    55KB

  • MD5

    2a19eede904690a3381a9cf82e1745b3

  • SHA1

    9c80343a80cc6182709d4ba8fb425db9f36911bd

  • SHA256

    43030d71b82db253e26877eacdc6547dca5b4f8dba8dc794161cbeb30150b23f

  • SHA512

    3b4b868cca83068016f7c073e959117b7f02601476176a2589213c98afe8651bbe62f800a91ee5c0e00ac370b3accd6a3164114e5f3eb4446574ee1c25f720de

  • SSDEEP

    768:79inqyNR/QtOOtEvwDpjBK/iVTab3GRuv3VylsPxAu:79mqyNhQMOtEvwDpjBPY7xv3gy5V

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-25_2a19eede904690a3381a9cf82e1745b3_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-25_2a19eede904690a3381a9cf82e1745b3_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2440
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    55KB

    MD5

    ca1c45ce8579fcf36e3f3d5b4322038b

    SHA1

    b954e6143c70340f330180883f5bcdb3d6c7ddb5

    SHA256

    a056500731131b8c009812b32453e2f4f50a969ff02ad8625d5ef275a3db130d

    SHA512

    2ca91fa2ba98a3f358bf4eb7c887c2bac3ac04afaa17659ef117ae8636b70edec9c00f620326e9c2cb9c1f9bea7a6d5b367055fcb5d23157fe5ee138d3240502

  • memory/2440-0-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/2440-1-0x0000000000250000-0x0000000000256000-memory.dmp

    Filesize

    24KB

  • memory/2440-2-0x0000000000350000-0x0000000000356000-memory.dmp

    Filesize

    24KB

  • memory/2440-9-0x0000000000250000-0x0000000000256000-memory.dmp

    Filesize

    24KB

  • memory/2440-15-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/2656-16-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/2656-19-0x0000000000290000-0x0000000000296000-memory.dmp

    Filesize

    24KB

  • memory/2656-18-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB