Analysis

  • max time kernel
    149s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12/02/2024, 09:24

General

  • Target

    2024-02-12_0ba3d905c2d070868ccd6987bf39a995_cryptolocker.exe

  • Size

    33KB

  • MD5

    0ba3d905c2d070868ccd6987bf39a995

  • SHA1

    551c93e2d833a979d441ca6ae1336648d9a23385

  • SHA256

    62bcba81fdb83fff11d6d8ca10ccd42bcbd3e0e7199651a9a53882d870fd7394

  • SHA512

    a7bea832b34ea8b8fbf5e0aa568de9faf9156cf0425e382cd18ac7396364e3ab3164225b46d93e32e1b41c3c73ab92cbc67bba9a23bb2231721253534986fa51

  • SSDEEP

    768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLam5axl:qUmnpomddpMOtEvwDpjjaYaT

Score
9/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Detection of Cryptolocker Samples 5 IoCs
  • UPX dump on OEP (original entry point) 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-12_0ba3d905c2d070868ccd6987bf39a995_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-12_0ba3d905c2d070868ccd6987bf39a995_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1064
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    33KB

    MD5

    9f626d50ce43504ad636007acfe79770

    SHA1

    16b18a8b79cb3f33719e8635c83bd4d45a279539

    SHA256

    76a4dd497781b76c47d011e36eab6b7d36fec83990e9b7e29f55100bd6490bf6

    SHA512

    7d8313ae2f4715105c6cf1d06ffd9a0af49708e77c15a989ff1c3e0d2ddf3b89b359e52ab729d8f7dff2763c69e5e7d056c168a40dce12cd15ded25592ae101d

  • memory/1064-0-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/1064-1-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/1064-3-0x0000000000200000-0x0000000000206000-memory.dmp

    Filesize

    24KB

  • memory/1064-2-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/1064-15-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/2832-16-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/2832-19-0x0000000000300000-0x0000000000306000-memory.dmp

    Filesize

    24KB

  • memory/2832-18-0x0000000000490000-0x0000000000496000-memory.dmp

    Filesize

    24KB

  • memory/2832-26-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB