Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    20-02-2024 01:25

General

  • Target

    2024-02-20_1e48eda459d4c41855315e56613e42dc_cryptolocker.exe

  • Size

    50KB

  • MD5

    1e48eda459d4c41855315e56613e42dc

  • SHA1

    54a04582835825749989f3d7d4dc17ec9aeaac7b

  • SHA256

    47bffea15053a9b563cb5c6f2481384e35602392c34d954a98cb2688e1f68a15

  • SHA512

    a1edc130715f470d1cfa00fa6a4c9ffd63de3bd8622f6129ad177c1493afd086f02d32d93cecfbd7ce4f796a973f66f3f5ac955f1858f0496af363623177c9a6

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjeJQ7pojakNF:V6a+pOtEvwDpje

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-20_1e48eda459d4c41855315e56613e42dc_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-20_1e48eda459d4c41855315e56613e42dc_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2512
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2276

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    50KB

    MD5

    8fa8c646652342cfc7205a6c880ccd14

    SHA1

    3fded12a63ddd0179d19f101d2a72c9dab61f92a

    SHA256

    773f62f1cb36a6ffbe5befd64f5f65f9adc9808c08c4b95cf8b5939a41c63550

    SHA512

    1f0735aa3c99c5d097f6bbf80cd2a1506c3f4d0246ff04e19cafa606fda90f320d6b0a9cd3b346a826d5fab59114bfe709a19e5792b026115496eb47869d0f3e

  • memory/2276-16-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB

  • memory/2276-15-0x00000000002B0000-0x00000000002B6000-memory.dmp

    Filesize

    24KB

  • memory/2512-0-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/2512-1-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/2512-2-0x00000000002F0000-0x00000000002F6000-memory.dmp

    Filesize

    24KB