Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    28/02/2024, 15:49

General

  • Target

    2024-02-28_7eac65a0423da77dd4490c6e54135ecf_cryptolocker.exe

  • Size

    74KB

  • MD5

    7eac65a0423da77dd4490c6e54135ecf

  • SHA1

    1fd7c6c0fae5e083c492855cd7b265bc0c25b8bc

  • SHA256

    4b80632f9872df1d63b18612561267b581afb15a63b2ef08ec93d9230de990e0

  • SHA512

    4112fdba34a582e36037c448dc38cc56a8c38d1cfbddfc6eb21ba86c2fa53f5e0ce6133fb04501513187b1333b9ae387eab2b71140482c2dac4b3689d321c3db

  • SSDEEP

    1536:X6QFElP6n+gJQMOtEvwDpjBZYTjipvF2bx1sQgg:X6a+SOtEvwDpjBZYvQd2x

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-28_7eac65a0423da77dd4490c6e54135ecf_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-28_7eac65a0423da77dd4490c6e54135ecf_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2256
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2992

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    74KB

    MD5

    143e951457336ad23910da9696145d10

    SHA1

    a74e02071c172c261daef106299ebb8390f0d746

    SHA256

    6dd5e75478fb2a81f42faec5c09828dd9acd44e301cf04069a30c8df6e75a8cc

    SHA512

    31be475d95593f74e113a7aed2cd001d259b50b2e206b8074992499c9653cddbabfbb0d0f9e0b010ef5f572c3dfb7f36fa43562df3666a3328192d99a1a0abc8

  • memory/2256-0-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2256-1-0x0000000000290000-0x0000000000296000-memory.dmp

    Filesize

    24KB

  • memory/2256-8-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2992-15-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB

  • memory/2992-22-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB