Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    22/02/2024, 17:47

General

  • Target

    2024-02-22_a5f64a52bdfefd9f32738fc664cb175c_cryptolocker.exe

  • Size

    38KB

  • MD5

    a5f64a52bdfefd9f32738fc664cb175c

  • SHA1

    3559fd9876d8591868f5cddbbcab20c1266f10d0

  • SHA256

    9bf2278cf4e3aacc161577e96776868d00baa7554b67159154f58dd50de35a0b

  • SHA512

    0560d3006a6c83ef5446173ea81689398898b20239ce4ef1de69e1b70d3bceb95f0dc7b502fcb5bbb3aa9d42d59900dfdefac4cf0c298e956be1f172abda775f

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBaac4HK/JyAF:X6QFElP6n+gJQMOtEvwDpjBsYK/XF

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-22_a5f64a52bdfefd9f32738fc664cb175c_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-22_a5f64a52bdfefd9f32738fc664cb175c_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2236
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2208

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          38KB

          MD5

          5ba4565d2aae08ed2b0a1348c2b349d5

          SHA1

          6c7975156acf6333abb7c64ff6237505d46d7fc7

          SHA256

          f365999d6e962d944900048e7eeba6bc13f432587bd7247220257092c26c7643

          SHA512

          8c45c3e4b999987bbb1ef62c5205d03e0b4d1409d2374f67a4697a2fe7e7d6abccf42a23dc9471da83035a0e9cc4a5fd9c0b6316e3fb29915f5ceb77e2c7f712

        • memory/2236-0-0x0000000000320000-0x0000000000326000-memory.dmp

          Filesize

          24KB

        • memory/2236-1-0x0000000000360000-0x0000000000366000-memory.dmp

          Filesize

          24KB

        • memory/2236-7-0x0000000000320000-0x0000000000326000-memory.dmp

          Filesize

          24KB