Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    19-02-2024 17:39

General

  • Target

    2024-02-19_ad2c5bf2abb453568eabd63cf284b255_cryptolocker.exe

  • Size

    43KB

  • MD5

    ad2c5bf2abb453568eabd63cf284b255

  • SHA1

    9fb5c65fd2b6f37401d0fcdf01cf151684d59913

  • SHA256

    3e6ea4d1f3f929632a341436abf9db646fb9780c25786b9ef76807cda1956004

  • SHA512

    96ef8238c0c20c493ceeac20fd7c93d819b1d782bcbba877af5b87f1495c10b4e2e8373bd27409aee81564a1e92b84e9ca44512f79ac918996c6f2e6563681ee

  • SSDEEP

    768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpj/MLam5aFr7YO6IL/:V6QFElP6n+gMQMOtEvwDpjyaYaFAz6

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-19_ad2c5bf2abb453568eabd63cf284b255_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-19_ad2c5bf2abb453568eabd63cf284b255_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2256
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    43KB

    MD5

    d5a2a26409d10ffb0fb4b7c6bfbe6e37

    SHA1

    5805ebe42e621b06f26cbd3ca86dc71372e002f3

    SHA256

    0ed39b7fa665f499e29e1b74f258e1f7f40c5bd5c7d74d1ea427195c3635002a

    SHA512

    c898cfe49f329b18c5dd1485a152afc5184f61de4f1651b8f4d12082548ef5f800084270a3c0fd675bdd2e52b432d8858e5c6273891badea9c98db0de81109eb

  • memory/2256-0-0x0000000000430000-0x0000000000436000-memory.dmp

    Filesize

    24KB

  • memory/2256-1-0x0000000000460000-0x0000000000466000-memory.dmp

    Filesize

    24KB

  • memory/2256-2-0x0000000000430000-0x0000000000436000-memory.dmp

    Filesize

    24KB

  • memory/2404-15-0x0000000000200000-0x0000000000206000-memory.dmp

    Filesize

    24KB

  • memory/2404-17-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB