Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    27-01-2024 05:27

General

  • Target

    2024-01-27_782071d5fca8eaea601c9f7d93c93532_cryptolocker.exe

  • Size

    45KB

  • MD5

    782071d5fca8eaea601c9f7d93c93532

  • SHA1

    dadbc6847b07749555529593c84908e4c009c6ec

  • SHA256

    ba720a408ba36b48bbcc0d5fd73a689379dac90aed021c0e03110f5ec65a81ea

  • SHA512

    73999135374f9eb1e555a4b48b2fc565a71852e70a01d823aa6c29b0ef64c026624127d659305e6ec6273b367748dffa65eee25286c6b5c5f9d0a94a2c1d7985

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBaaEqbIu556yPRi:X6QFElP6n+gJQMOtEvwDpjB0GIWvPRi

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-27_782071d5fca8eaea601c9f7d93c93532_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-27_782071d5fca8eaea601c9f7d93c93532_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2152
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:1860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    45KB

    MD5

    b5047ea7301811e83be43e4d19521530

    SHA1

    df4923452b2ae8fa2fcb33ca00f99faa47fbdacf

    SHA256

    185bad1db7c3084e02a9778f2c2f3cbe095f3a92c4bc9b89f9c323ee02f92fd5

    SHA512

    8a72b4ef418029628869144c72292a086f18f0efed990c4c486f4f1f1169a7cc25f478a71e846cdf87c33e1a422be4f67a3867ea99dd9633d90532526139b2e1

  • memory/1860-15-0x0000000000470000-0x0000000000476000-memory.dmp

    Filesize

    24KB

  • memory/1860-22-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2152-0-0x00000000001E0000-0x00000000001E6000-memory.dmp

    Filesize

    24KB

  • memory/2152-1-0x00000000001E0000-0x00000000001E6000-memory.dmp

    Filesize

    24KB

  • memory/2152-2-0x00000000002A0000-0x00000000002A6000-memory.dmp

    Filesize

    24KB