Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    13/02/2024, 08:22

General

  • Target

    2024-02-13_e8c92d9fb3e8e5158ffd2a4da6d0cfdd_cryptolocker.exe

  • Size

    93KB

  • MD5

    e8c92d9fb3e8e5158ffd2a4da6d0cfdd

  • SHA1

    348e6c6cee845cdeeae718b1b280ec35c4de984e

  • SHA256

    0f790249a9167a3a3c54db959cec8aea208f359123c1ee3bf273a4574ad17294

  • SHA512

    d02963bd06728e8124359edad20cfb48f594c60d57f56ebbfb78e26a9e6b30221301f996e355a02b5ba291f1e9ad0c963729124f674a45beb81f17f9094c72cd

  • SSDEEP

    1536:26QFElP6n+gBQMOtEvwDpjQGYQbN/PKwNCk:26a+2OtEvwDpjtzf

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-13_e8c92d9fb3e8e5158ffd2a4da6d0cfdd_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-13_e8c92d9fb3e8e5158ffd2a4da6d0cfdd_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1812
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2144

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    93KB

    MD5

    8fb4823c8c1a8e9de451e16bb91ae5f3

    SHA1

    d8c2afb114bed9c9cb855c363536276cfdfe5839

    SHA256

    c4af3297f8e54ac1d86c4bfc201eb74e68077a590fcf5e1570770934ab7f870b

    SHA512

    92fb87d1c89f97351bb697b704b0cfbff2bc170b99d5af792e86ed91177e25bafb74cfac9e42c5f8d6d6c859c316dcf253b49b6c7e4ba5c728d39572c0fe357a

  • memory/1812-0-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/1812-1-0x0000000000290000-0x0000000000296000-memory.dmp

    Filesize

    24KB

  • memory/1812-8-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2144-15-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/2144-19-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB