Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    03/02/2024, 04:34

General

  • Target

    2024-02-03_ab018e3db7e8223b67e69aa11f3f020e_cryptolocker.exe

  • Size

    48KB

  • MD5

    ab018e3db7e8223b67e69aa11f3f020e

  • SHA1

    181d53ae41c63a2ae51af39861fac787e847397c

  • SHA256

    9faa9d8748012be8b953658d04d9d1db2f5bbc5f871237fb30c4d36d955cb2f6

  • SHA512

    7fba8be570d6a07dac8da961fb3320874bf60e382cafdba3ae39736682bfcfc3cd041dbccce98e62afe361253916c669edbf4571ea12c0eeed52596dad0854a6

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjeJQ7pojakNm:V6a+pOtEvwDpjN

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-03_ab018e3db7e8223b67e69aa11f3f020e_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-03_ab018e3db7e8223b67e69aa11f3f020e_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1248
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    49KB

    MD5

    8ad6f5248a403b61309c6bf99944f462

    SHA1

    3801892d109d0bf458737615226967d29dc8fdec

    SHA256

    a4a7707a53e77c18efb605c3dbfc243046e75f061be929f5380de949b05c9ed3

    SHA512

    de7b69070d2a6a178c041e2fb9920d73bd8b67d1a60cd052bea3a274605bccaca656d084062538728dae4f5c0679559e76c3ddb4f5043ad978362325bffbba1f

  • memory/1248-0-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/1248-1-0x0000000000290000-0x0000000000296000-memory.dmp

    Filesize

    24KB

  • memory/1248-8-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2372-15-0x00000000003F0000-0x00000000003F6000-memory.dmp

    Filesize

    24KB

  • memory/2372-22-0x00000000001C0000-0x00000000001C6000-memory.dmp

    Filesize

    24KB