Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    13/02/2024, 04:46

General

  • Target

    2024-02-13_5d6b0bb937f4d170febd529d9f4de43a_cryptolocker.exe

  • Size

    48KB

  • MD5

    5d6b0bb937f4d170febd529d9f4de43a

  • SHA1

    1beb0d6e8b7fcca485f84fe31ac6bb30c76ff4de

  • SHA256

    8020f1c82b1603040eda3315b16912bac48fe2f6ebd3c2cf1269a653a4a67bb6

  • SHA512

    5dc10bd443bf83210430047102be80acaed1e397cf58a985021dc01a7565b3e458223e0b27ac3eba7c68f7e1fd64e6bf08875bfd3df6e9302049822caf1c795c

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjeJQ7pojaklw:V6a+pOtEvwDpjn

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-13_5d6b0bb937f4d170febd529d9f4de43a_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-13_5d6b0bb937f4d170febd529d9f4de43a_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2448
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2748

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          48KB

          MD5

          edef51c09e4a2c3a2541c5c44edd1746

          SHA1

          0828fef13c305e578e39ea40aa7693ef9ae4ea70

          SHA256

          713923499058cadd1818ac566832715e95c2b9e6ed8a260d1fc137fcbc753f76

          SHA512

          bf9aa2b2f0c6a74d9fdb1ca38a0e2140ac7a8872fdd7738430139309854159cd9b38ac4799e467e8668ca8bd7ea83466c226a46e52385b63227b301a97b97766

        • memory/2448-0-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/2448-2-0x0000000000270000-0x0000000000276000-memory.dmp

          Filesize

          24KB

        • memory/2448-1-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/2748-15-0x0000000000330000-0x0000000000336000-memory.dmp

          Filesize

          24KB