Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/01/2024, 13:24

General

  • Target

    2024-01-26_20d36e99d76fd9d36f95bec56e5b3c15_cryptolocker.exe

  • Size

    68KB

  • MD5

    20d36e99d76fd9d36f95bec56e5b3c15

  • SHA1

    c5764befe82194b1f15565c65c2f814cfb62bd40

  • SHA256

    497aa5850a837cc8e6300451222348bdec15dae49abe9379ae474466aad4c854

  • SHA512

    3339f3f75cb4699e9195cbd45a97e9a604b8406e9c0b943ff7f399e9592dcc51a1c53c46906136ef677dc78fa44714ed29678d506ce7e19f4f4573e7617ae72f

  • SSDEEP

    1536:Dk/xY0sllyGQMOtEvwDpjwycDtKkQZQRKb61vSbgZ3QzNKU2:DW60sllyWOtEvwDpjwF85U

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 3 IoCs
  • Detection of Cryptolocker Samples 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-26_20d36e99d76fd9d36f95bec56e5b3c15_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-26_20d36e99d76fd9d36f95bec56e5b3c15_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2216

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    68KB

    MD5

    99b3972a82976571fab103aa13f6e8b1

    SHA1

    e209269d0b567b50dfc6299f9becee7e39453f91

    SHA256

    cc503ed290ee670fc74ab180cbdbb6b9d20598d3a873265d182792fcd84d187a

    SHA512

    8fa4ae66748214e15575412324d01c7c64ace3196aca34e7ea75eeb3ecc836513ea1990b1cf9e383bcfc4544550cc1363d7bc38f51625ee7487ef3b7483969dc

  • memory/2148-8-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/2148-9-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2148-1-0x0000000000290000-0x0000000000296000-memory.dmp

    Filesize

    24KB

  • memory/2148-0-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2216-24-0x0000000000320000-0x0000000000326000-memory.dmp

    Filesize

    24KB

  • memory/2216-17-0x0000000000360000-0x0000000000366000-memory.dmp

    Filesize

    24KB

  • memory/2216-15-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB