Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    03/02/2024, 15:30

General

  • Target

    2024-02-03_b095489d1c056e97c175d8cda69f84b5_cryptolocker.exe

  • Size

    74KB

  • MD5

    b095489d1c056e97c175d8cda69f84b5

  • SHA1

    6ffe4bbd4d96f67fce658e200f006d033bef6953

  • SHA256

    422d1513b125e91e2eb3191cf4723e67df13c672f738ed691a1f10d3e7f6e6bb

  • SHA512

    a836e8ba7d07d11af5accf1c9222416bc3a6ddd0cd7d2613ff42fb22f3bb356d5b4cbb64d352e4902f64db75afb8ec7df3bfc47ef0260f5f0f15d227dcce59e8

  • SSDEEP

    1536:X6QFElP6n+gJQMOtEvwDpjBZYTjipvF2bx1ct:X6a+SOtEvwDpjBZYvQd2a

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-03_b095489d1c056e97c175d8cda69f84b5_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-03_b095489d1c056e97c175d8cda69f84b5_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2332
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2380

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    74KB

    MD5

    e41aee01d48492a94a81fb5023d1785f

    SHA1

    1cb42f1e2644812895864d00e6bb89f8eb912680

    SHA256

    af6fe7c7c307a497e951f3ad4e897ff9903e8c732c83be4320066e57e0704272

    SHA512

    9e94fe25f63025baf7b86dd98f3dab2bda8c56c5ee71cc2f491efaa30a1541e412887e1ebcb6591a0c8610a1cd174d274a24927bce41fb8dd621bd3e56bdca17

  • memory/2332-0-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2332-2-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2332-1-0x0000000000270000-0x0000000000276000-memory.dmp

    Filesize

    24KB