Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    20/02/2024, 15:02

General

  • Target

    2024-02-20_c207b59cdb7f5197ef2c763de986f335_cryptolocker.exe

  • Size

    58KB

  • MD5

    c207b59cdb7f5197ef2c763de986f335

  • SHA1

    b826978200f7e712e465063bc8b72690baf26de0

  • SHA256

    220fd00b02a7c556b538f68e477eaac0ef725349a14bca76cd33d5ecf254b8a9

  • SHA512

    33302fa5ef431b3105182d5fc3b0919535b020867a4572528fb69d2eac81433e58ea4e3e97904f81329e4783553c709bbb265831bfc108deeb8406364b1fc7a6

  • SSDEEP

    768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpj/MLa5VccPt547/qm3ME:V6QFElP6n+gMQMOtEvwDpjyaLccVCbDf

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-20_c207b59cdb7f5197ef2c763de986f335_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-20_c207b59cdb7f5197ef2c763de986f335_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2752

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          59KB

          MD5

          17c525a6320cd6c8f5534c81b598ee27

          SHA1

          024d038cfd729206d50b4d8519bdd1586eba5867

          SHA256

          57d77976d8520015cbdc4d85d2f12fbb8f3021d12156b7aab953738bc7f43b8a

          SHA512

          7a2f39c495e6081ebae54f56f3dd2820fd2c5c81dd0912e5a57641ab8e8603515a425f63bd35fc234af0c4bb58f87d5bba581d1a95031bd1c6fe821fad60e0a7

        • memory/2336-0-0x00000000001D0000-0x00000000001D6000-memory.dmp

          Filesize

          24KB

        • memory/2336-1-0x0000000000200000-0x0000000000206000-memory.dmp

          Filesize

          24KB

        • memory/2336-2-0x00000000001D0000-0x00000000001D6000-memory.dmp

          Filesize

          24KB