Analysis

  • max time kernel
    138s
  • max time network
    162s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05/03/2024, 17:40

General

  • Target

    2024-03-05_9fbd6dca029f831fb89ac3a1676a2ebc_cryptolocker.exe

  • Size

    70KB

  • MD5

    9fbd6dca029f831fb89ac3a1676a2ebc

  • SHA1

    bd2aac199556d5f9b20e4623df53e576ac25526b

  • SHA256

    369cc12128c1a5aeaa2f6d80cb7bbfb6932826f68e80432a6adb9445621454aa

  • SHA512

    0866835c6627739a3c32192efb07049c6956dcc13896cfc617c4b96d8ee3889a6a5da70f267bb3133b2de77a229b31ab2b8c99f70e8fe4dc124c159c97547f6e

  • SSDEEP

    768:u6LsoEEeegiZPvEhHSG+gZgtOOtEvwDpjeMLam5ax+Il:u6QFElP6n+gWMOtEvwDpjjaYaV

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-05_9fbd6dca029f831fb89ac3a1676a2ebc_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-05_9fbd6dca029f831fb89ac3a1676a2ebc_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2968
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2496

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    70KB

    MD5

    1475f0aec8179c9560aadbdf3a694578

    SHA1

    b8ce06a2eb63c0c133585f96dbcf934bc3e6d8a4

    SHA256

    9bb628e29988f3db4e9e49a1bbfada4e3977da77762e0d8636e82a36855735a8

    SHA512

    a8c2e1f6bd23fa73cd7ef6bbfbd85bf465a664003173394cff9f6e112f7d629407d54967a83bdcf347ae740fdabf5ab877ea096a7ca7b942ff5ca5162064d9c9

  • memory/2496-15-0x0000000000270000-0x0000000000276000-memory.dmp

    Filesize

    24KB

  • memory/2496-17-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2968-0-0x0000000000420000-0x0000000000426000-memory.dmp

    Filesize

    24KB

  • memory/2968-1-0x0000000000460000-0x0000000000466000-memory.dmp

    Filesize

    24KB

  • memory/2968-7-0x0000000000420000-0x0000000000426000-memory.dmp

    Filesize

    24KB