Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    03/02/2024, 02:08

General

  • Target

    2024-02-03_482271afc4d0acd35f41a1385b0b6256_cryptolocker.exe

  • Size

    69KB

  • MD5

    482271afc4d0acd35f41a1385b0b6256

  • SHA1

    98beb3eeba57aafffcbeabdfc14bda2c5d47a0ca

  • SHA256

    c402a99d83ece9505e1d2f760a679c2834bae662010f60fa28d02194cbd59e64

  • SHA512

    cf0bd1e585653e7ae11b07be370cd1a9e623d09dede7456db9958ed31351cd01eb6e3b0272e74b051390fc15b686e37e7b1362702c94e634b0f8fe82f6c8bd8d

  • SSDEEP

    1536:Dk/xY0sllyGQMOtEvwDpjwycDtKkQZQRKb61vSbgZ3QzNKUtbz:DW60sllyWOtEvwDpjwF85z

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Detection of Cryptolocker Samples 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-03_482271afc4d0acd35f41a1385b0b6256_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-03_482271afc4d0acd35f41a1385b0b6256_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    69KB

    MD5

    25d2d47510588f17add43975d896efb8

    SHA1

    61985f28786ef79f638a517dc52b8ca9c11675b2

    SHA256

    c639a842b35ad55966a3fe84f0e1f040c897f5551e080af72a750483a5448609

    SHA512

    caef94c71cecbc4fbf64078edeabd752dfc1164d49c8d00e149a3768bb0f8aca35cb7682da0c438bbb9af888a06e4e4714d0dd0e804e895e531e198f88623600

  • memory/2148-0-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/2148-1-0x0000000000440000-0x0000000000446000-memory.dmp

    Filesize

    24KB

  • memory/2148-2-0x0000000000440000-0x0000000000446000-memory.dmp

    Filesize

    24KB

  • memory/2148-3-0x0000000000480000-0x0000000000486000-memory.dmp

    Filesize

    24KB

  • memory/2148-15-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/2148-13-0x0000000002980000-0x000000000298B000-memory.dmp

    Filesize

    44KB

  • memory/2756-17-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/2756-19-0x00000000002D0000-0x00000000002D6000-memory.dmp

    Filesize

    24KB

  • memory/2756-24-0x0000000000210000-0x0000000000216000-memory.dmp

    Filesize

    24KB