Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    04/02/2024, 05:47

General

  • Target

    2024-02-04_af4f24a2df408b33620356d555fdf112_cryptolocker.exe

  • Size

    74KB

  • MD5

    af4f24a2df408b33620356d555fdf112

  • SHA1

    d350d4f245790c0933b56de53b16dc14433c7c19

  • SHA256

    d9c497358e930776f160310d3536e01958c66ed39dca73e6e9730b2e7881b8dd

  • SHA512

    4caa8fc1e582a24a68ec07b4959dbf2b60640deae4f0c812bad88913eff3668f7b4e8ff30914070873ce6c21a87d730ccbf7d7fd9050caa1379b3de0027afa19

  • SSDEEP

    1536:X6QFElP6n+gJQMOtEvwDpjBZYTjipvF2bx1c5:X6a+SOtEvwDpjBZYvQd2G

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-04_af4f24a2df408b33620356d555fdf112_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-04_af4f24a2df408b33620356d555fdf112_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:3032

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          74KB

          MD5

          be92a196463030bed2b53dd970c10072

          SHA1

          e88d9c9c07864582ccdb21488963ca645165e8b3

          SHA256

          7adb006552f3cef8ffb19c2a7ec3cd343654d33093131cfc8c6cfd4dec62c0c8

          SHA512

          d0e3cc71baa7c1785f0d7350b3f1c30036bdb3e64e4c297f0518eb4c3bee2018b74b9d73ec2b17240458f9e9d8f2f632ea840ede74ccab5920a13853b26073f3

        • memory/2932-0-0x0000000000420000-0x0000000000426000-memory.dmp

          Filesize

          24KB

        • memory/2932-1-0x0000000000460000-0x0000000000466000-memory.dmp

          Filesize

          24KB

        • memory/2932-8-0x0000000000420000-0x0000000000426000-memory.dmp

          Filesize

          24KB

        • memory/3032-15-0x00000000004D0000-0x00000000004D6000-memory.dmp

          Filesize

          24KB

        • memory/3032-22-0x0000000000250000-0x0000000000256000-memory.dmp

          Filesize

          24KB