Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    19/02/2024, 20:36

General

  • Target

    2024-02-19_949c4b374825e3a25aaabe4624ffe35d_cryptolocker.exe

  • Size

    41KB

  • MD5

    949c4b374825e3a25aaabe4624ffe35d

  • SHA1

    f4b4f191e68cad3802036b5518facb3881a4e990

  • SHA256

    98d4553864c0b0694dd36d4a084f7580c6106f22216b242cd9ecac30a30e7a4c

  • SHA512

    507267b90c50fd0d468c41383a9d5a24f44567ca48a650129a3c844657534a2488f1b404eca2e3ab46b1255f688144f117ea84f7e0c2718387bac07dd3f07b3d

  • SSDEEP

    384:e/4wODQkzonAYsju5N/surDQtOOtEvwDpjqIGROqS/Wcz0BVFHxztr:79inqyNR/QtOOtEvwDpjBKcmfxN

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-19_949c4b374825e3a25aaabe4624ffe35d_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-19_949c4b374825e3a25aaabe4624ffe35d_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:1340

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    41KB

    MD5

    b50102938c1f26283aa747bc71eeea09

    SHA1

    c1c1e6a7006e2757b8a07efb881dab43dd80269b

    SHA256

    a07803d3084b12fd2c77da5c841cd9636bab6a009fa2d7e211a8e1a5a290d1b5

    SHA512

    3c6e358a9fed95a2935506d2603fd3bd91f0ae8dbf33285e3fe5325daa57cc63bd8c1d2242c611c8f586a0bdda859f0de23c410fdfd0e123ecbe69056c50813e

  • memory/1340-16-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/1340-18-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB

  • memory/1340-25-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2212-0-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/2212-1-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2212-2-0x0000000000470000-0x0000000000476000-memory.dmp

    Filesize

    24KB

  • memory/2212-4-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2212-14-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB