Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    20/02/2024, 06:14

General

  • Target

    2024-02-20_e9acc5d4a39602fbd3ae4831026c9e85_cryptolocker.exe

  • Size

    99KB

  • MD5

    e9acc5d4a39602fbd3ae4831026c9e85

  • SHA1

    805383387e6581be5e3663412d1621b55d948143

  • SHA256

    67409bea58db9b88024f684c057ba163237710ea10035a8e1f47956746fdee2d

  • SHA512

    73a76f92cc67d3bd1421ee0fe7d67d8f973595074afa804763edb25f6e8010fc023b071be54decfcb269b139aa28214a32b0cf31d65498b84f877f094b92ecd1

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjQGYQbN/PKwNgpQbCJjG:V6a+pOtEvwDpjtzZ

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-20_e9acc5d4a39602fbd3ae4831026c9e85_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-20_e9acc5d4a39602fbd3ae4831026c9e85_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2316

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    99KB

    MD5

    57bffe2874e1a1bc438bfe33a1745051

    SHA1

    284d58bc1debb89650f51339bf18029a9fc3e068

    SHA256

    9e1ee39c72e3cd0bfe70b46a450349a4fae4e931c23545c760c619d0c8cc4453

    SHA512

    1a8abffb207c9990241fe0c8df6dca39ca6063c551c32a10752f9516ef9a3034d55827179ef93ecd94ec19ebd29282656deb5f7552f19e168eaea452a1749901

  • memory/2204-5-0x00000000001C0000-0x00000000001C6000-memory.dmp

    Filesize

    24KB

  • memory/2204-1-0x0000000000270000-0x0000000000276000-memory.dmp

    Filesize

    24KB

  • memory/2204-0-0x00000000001C0000-0x00000000001C6000-memory.dmp

    Filesize

    24KB

  • memory/2316-22-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2316-15-0x0000000000370000-0x0000000000376000-memory.dmp

    Filesize

    24KB