Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28/02/2024, 11:31

General

  • Target

    2024-02-28_3d455c4f8c031f3cbbbe8e073a3fb1f2_cryptolocker.exe

  • Size

    105KB

  • MD5

    3d455c4f8c031f3cbbbe8e073a3fb1f2

  • SHA1

    94f764e10be4fce170d1e5848f8f1340d14531ea

  • SHA256

    f1cb842bf29159701d91526c2184893bef5af721b1fd22536bdb3f3303b1fae9

  • SHA512

    ed4c0b5469b6de707949937f3e466cd67bbedbb5588a517621daf9e87cfa05e022cc220f1cdb3dedec27a71437d25a62b8f3141e60e34a1e80b00e13ec301261

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GksaLG:1nK6a+qdOOtEvwDpj3

Score
9/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Detection of Cryptolocker Samples 5 IoCs
  • UPX dump on OEP (original entry point) 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-28_3d455c4f8c031f3cbbbe8e073a3fb1f2_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-28_3d455c4f8c031f3cbbbe8e073a3fb1f2_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2976

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    105KB

    MD5

    255fc7086a7d66b629e601741194d561

    SHA1

    f5a04ad89231d7c43841352a2e3bdddf751c21cd

    SHA256

    4b0e8b9e39b244cf94b57c25934ea718ee9ceafe1692452b6fa0216aa8a18b3f

    SHA512

    df370793597864bec8311fa562187d10f30d8a9880c1d18ec2f4db1f5d3047966aaead836b74b9085e0606516d2a8a08ee16aabaee362e66689c8c1898a019f3

  • memory/2188-1-0x0000000000440000-0x0000000000446000-memory.dmp

    Filesize

    24KB

  • memory/2188-0-0x0000000000500000-0x000000000050F311-memory.dmp

    Filesize

    60KB

  • memory/2188-2-0x0000000000480000-0x0000000000486000-memory.dmp

    Filesize

    24KB

  • memory/2188-9-0x0000000000440000-0x0000000000446000-memory.dmp

    Filesize

    24KB

  • memory/2188-14-0x0000000000500000-0x000000000050F311-memory.dmp

    Filesize

    60KB

  • memory/2188-18-0x0000000000670000-0x0000000000680000-memory.dmp

    Filesize

    64KB

  • memory/2188-28-0x0000000000670000-0x0000000000680000-memory.dmp

    Filesize

    64KB

  • memory/2976-16-0x0000000000500000-0x000000000050F311-memory.dmp

    Filesize

    60KB

  • memory/2976-19-0x0000000000350000-0x0000000000356000-memory.dmp

    Filesize

    24KB

  • memory/2976-21-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2976-27-0x0000000000500000-0x000000000050F311-memory.dmp

    Filesize

    60KB