Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    22-02-2024 06:55

General

  • Target

    2024-02-22_e46d1e525f79f8dd4c21fc660375f940_cryptolocker.exe

  • Size

    82KB

  • MD5

    e46d1e525f79f8dd4c21fc660375f940

  • SHA1

    4c36a2d8979cab0c09a85ac3d72c2f4ed0d2417b

  • SHA256

    25917ff8d4560910b05d9f60876744d418bec40fcd62a4c98624fe785e851c7b

  • SHA512

    3b5fbdca032940b00f64ff930c5a5e526783709b01a20c2c0c9297f8caf2f4ab7f557917d4e35b4156aba13fed127d403d0d3850813065068bafec503bf3ea46

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjyaLccVNlVSLX:V6a+pOtEvwDpjvp+

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-22_e46d1e525f79f8dd4c21fc660375f940_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-22_e46d1e525f79f8dd4c21fc660375f940_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:1032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    83KB

    MD5

    be4f634d771cc1a4931c113ce7494747

    SHA1

    13ac511fd442a1630c6897d3f53ebd1741e4b0e8

    SHA256

    d1ab0c0a635837461f06b4fa784955352123e2b1802ee58c4413390261d67ca7

    SHA512

    d4b50d56563ba0cbd4656f083fcae63f3a2a9f0b37bb9eebadffbac27495f24f62a4d8ec6e70edbf69bf53f279341c9fe81cd74fb849ec3ed0e8df8c8f437828

  • memory/1032-15-0x0000000000350000-0x0000000000356000-memory.dmp

    Filesize

    24KB

  • memory/1032-18-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2932-0-0x0000000000230000-0x0000000000236000-memory.dmp

    Filesize

    24KB

  • memory/2932-2-0x0000000000230000-0x0000000000236000-memory.dmp

    Filesize

    24KB

  • memory/2932-1-0x0000000000300000-0x0000000000306000-memory.dmp

    Filesize

    24KB