Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-02-2024 02:45

General

  • Target

    2024-02-25_ba504d1aef112af7be77060d5386f37e_cryptolocker.exe

  • Size

    39KB

  • MD5

    ba504d1aef112af7be77060d5386f37e

  • SHA1

    8ae821ce54349cfab5442d9588bb55ed47fd001d

  • SHA256

    4451611b7da1bc883789f4f952f2a8b04fe15bc4792aaa6ca479db2df1c65133

  • SHA512

    8f9da5f8f01fec98387d20c23928e63153c82c7b7ba7969e2905a6b1cb13c282e2d54fe77c47d2e9bb46746db10e01bf3c6493211a2d7b7379781ad990082c7b

  • SSDEEP

    768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpj/MLam5axRVZBL:V6QFElP6n+gMQMOtEvwDpjyaYaLBL

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-25_ba504d1aef112af7be77060d5386f37e_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-25_ba504d1aef112af7be77060d5386f37e_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1660
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2892

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    39KB

    MD5

    28d2c68742d8847aaf30c05fc364cbb8

    SHA1

    ee501aac2fedbae42d2bf5186600c819c522b41f

    SHA256

    b614730c8c8dfc87bd7198762ad105c3041c0c78187bfc2aaa2aad9e61904cba

    SHA512

    474f3d006166f98c75891e4bd6ac8daac302675eb14ef9e35c7057d7515a9a9046d2b141066e9daa51dcef21ba2ed458e2fc5655ade41d9a0fd21240d3148574

  • memory/1660-0-0x0000000000350000-0x0000000000356000-memory.dmp

    Filesize

    24KB

  • memory/1660-1-0x0000000000490000-0x0000000000496000-memory.dmp

    Filesize

    24KB

  • memory/1660-8-0x0000000000350000-0x0000000000356000-memory.dmp

    Filesize

    24KB

  • memory/2892-15-0x00000000003F0000-0x00000000003F6000-memory.dmp

    Filesize

    24KB

  • memory/2892-18-0x00000000001C0000-0x00000000001C6000-memory.dmp

    Filesize

    24KB