Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    27/01/2024, 05:31

General

  • Target

    2024-01-27_b4634b1f0b6b05ca349c7afd807008a6_cryptolocker.exe

  • Size

    104KB

  • MD5

    b4634b1f0b6b05ca349c7afd807008a6

  • SHA1

    ce6ddea15c09c53342730d8ee047772d8aaab847

  • SHA256

    77adafa22d25589de5368ae6d5a59fa63b74cc35ddffd91cc9079c36f37987a3

  • SHA512

    a0084ea054c182094dd729e58fbf27600620321fac5ac87750b36a542e29575283720d36b5ea0b0562494bf2b8e8e397553692749c4a397165cf5dabdb1eccfb

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6Gksf:1nK6a+qdOOtEvwDpjf

Score
9/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Detection of Cryptolocker Samples 5 IoCs
  • UPX dump on OEP (original entry point) 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-27_b4634b1f0b6b05ca349c7afd807008a6_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-27_b4634b1f0b6b05ca349c7afd807008a6_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2888
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2216

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          104KB

          MD5

          3e43dcb4a37f383003b33d4a5d4e2d1c

          SHA1

          000957ff8e7b4790089f27d179e39c3c239be35d

          SHA256

          00cab4d5a874d96deea6bf79cd48b2edad317d2a14d0c09e16caa0bbe8011829

          SHA512

          bb71d64aca0dd74d6b0fecccd6c66869331762b4b7ed4ab8cfd398e72891f84b808f0818ba948f38b73abd6655c5c7674f8c0b80f3fd703361b8419bd4309e52

        • memory/2216-17-0x0000000000500000-0x000000000050F311-memory.dmp

          Filesize

          60KB

        • memory/2216-19-0x00000000002C0000-0x00000000002C6000-memory.dmp

          Filesize

          24KB

        • memory/2216-23-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/2216-27-0x0000000000500000-0x000000000050F311-memory.dmp

          Filesize

          60KB

        • memory/2888-0-0x0000000000500000-0x000000000050F311-memory.dmp

          Filesize

          60KB

        • memory/2888-1-0x0000000000420000-0x0000000000426000-memory.dmp

          Filesize

          24KB

        • memory/2888-2-0x0000000000460000-0x0000000000466000-memory.dmp

          Filesize

          24KB

        • memory/2888-9-0x0000000000420000-0x0000000000426000-memory.dmp

          Filesize

          24KB

        • memory/2888-15-0x0000000000500000-0x000000000050F311-memory.dmp

          Filesize

          60KB

        • memory/2888-16-0x00000000005A0000-0x00000000005B0000-memory.dmp

          Filesize

          64KB