Analysis

  • max time kernel
    132s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    04-02-2024 15:33

General

  • Target

    2024-02-04_a164427cd50b27593c8253b6c587aefe_cryptolocker.exe

  • Size

    149KB

  • MD5

    a164427cd50b27593c8253b6c587aefe

  • SHA1

    48abbb6e2542089e6a62e1c1b5ac8362793fb43a

  • SHA256

    8dbe8dd87884556a5a59e5980cab5e7c98b1593364d23a5dad8e6349b3d35938

  • SHA512

    5a9c537e1407697b7bc326f4e36fdae7af8466482952f8f3bd8424ff592e2385ff3f350468083799f3558b0afdf7176fea2a429b5f204567f42f83988e114081

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjQGYQbxGYQbxGYQbPlooHPPFYrPu:V6a+pOtEvwDpjt22P

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-04_a164427cd50b27593c8253b6c587aefe_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-04_a164427cd50b27593c8253b6c587aefe_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2132

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    150KB

    MD5

    6d4cee11960f2fa38ac33c0c6c5e45ca

    SHA1

    289c87ced103d5dbb3aed20d77bd205c8571fbb0

    SHA256

    4e5c7314e68248e59e246b452d413822c93b6a898770590b9e0582cd6923165f

    SHA512

    bb2ed55d599ad7035e54578553300e5321be65923d997d2f0cbd4f39772ccff926eb541ae9b948f100a353bd1cf6d574470c57024c56085203128f0f2ac699ad

  • memory/2132-15-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB

  • memory/2132-22-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2180-0-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/2180-1-0x00000000002F0000-0x00000000002F6000-memory.dmp

    Filesize

    24KB

  • memory/2180-2-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB