Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    23/02/2024, 11:07

General

  • Target

    2024-02-23_dfaab30b365dc211b0f24bf343958370_cryptolocker.exe

  • Size

    70KB

  • MD5

    dfaab30b365dc211b0f24bf343958370

  • SHA1

    fca05d1d5b844915283e2ade24a89a2e9db7cf22

  • SHA256

    3afb2fdb6921234c1c6c8a3fb09103b17a4acde227984c9fc30d11d43e64c574

  • SHA512

    8441511655872adde83604cd9b37a3fa8aad90de5955041a71cf18b4565a6c0745b7ce0671d84338f02cc0e1c5ae86fec8a06a0e02b28699198f2181c0251ded

  • SSDEEP

    1536:Dk/xY0sllyGQMOtEvwDpjwycDtKkQZQRKb61vSbgZ3QzNKUNZOud:DW60sllyWOtEvwDpjwF85v

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 3 IoCs
  • Detection of Cryptolocker Samples 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-23_dfaab30b365dc211b0f24bf343958370_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-23_dfaab30b365dc211b0f24bf343958370_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1512
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2368

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    70KB

    MD5

    98f8a8b7a3d625709a5e6169c577b320

    SHA1

    d7d2f038f62524a8d52fa286a094aca1fc2efa7d

    SHA256

    ccdc1533687d048f44826bf1f54fada1774eed0cb572cf0a1bce486d82db1c93

    SHA512

    beaa2f0d02713e31ba88d048949ef4464364455cc9aaa5e9bcacaf80681546b6febd2cf137398d30abf82875bf598f3aa2d5c4a1658eb1f425a5e4d08582c449

  • memory/1512-0-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/1512-2-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/1512-1-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB

  • memory/1512-3-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2368-15-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/2368-17-0x00000000004A0000-0x00000000004A6000-memory.dmp

    Filesize

    24KB

  • memory/2368-24-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB