Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    17/02/2024, 09:54

General

  • Target

    2024-02-17_ff51a1afb2284154a1d5366fe81e3e5e_cryptolocker.exe

  • Size

    82KB

  • MD5

    ff51a1afb2284154a1d5366fe81e3e5e

  • SHA1

    5713bf8cfd45326fe3a540de62d771b32657a5fc

  • SHA256

    a558e92ab010954a5b3a6a6e1b8b0e3b3bcbba4c867fde47bad9efc1642a6ad1

  • SHA512

    d052832f8e121369d3c7e2b1e2a7c641f9f524ac7ca3eaa51ea6e0daf314fed2770804b99d12d6bd3846a9a74a24520e6d474e5089ddf6870645294be3bd82d3

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjyaLccVNlVSLg:V6a+pOtEvwDpjvpV

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-17_ff51a1afb2284154a1d5366fe81e3e5e_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-17_ff51a1afb2284154a1d5366fe81e3e5e_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2236

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    82KB

    MD5

    1e9bc54411f4b117324e8dd15cae4a88

    SHA1

    88ac7e91c8c11376a11088c24ea776c7725fe507

    SHA256

    07de93fe4484f50aa0b1ecfb63e19322e7c46b314a9da05294fa85bb8a4e0bf8

    SHA512

    581c4d12481d44d41bde3b9ffc9b3dd3bb8316d507cd7d67b6cd37b3776fb115c1bba6814041f117a38e3eed48e0d66a43a8949be919aa635d5dacee41973399

  • memory/2236-15-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB

  • memory/2236-16-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/3016-0-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB

  • memory/3016-2-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB

  • memory/3016-1-0x00000000002B0000-0x00000000002B6000-memory.dmp

    Filesize

    24KB