Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    08/03/2024, 05:42

General

  • Target

    2024-03-08_42f6e8941ac9515bb216944966b56723_cryptolocker.exe

  • Size

    95KB

  • MD5

    42f6e8941ac9515bb216944966b56723

  • SHA1

    691637c294f472affcae15f9a9b037b5db509ab5

  • SHA256

    f7d4fb78ed65eb48f52200c873231d32fea42e8b1b1b8c3aefb87ecb170ad1e6

  • SHA512

    ca9d2ee22a0f79e2451af4c4e95216b0936908768264d8d142aaa101d7b9d1461342fd47e63c3ca32030f829672ccea36ea283bce73430fc80442ac35179a55d

  • SSDEEP

    1536:Z6QFElP6n+gMQMOtEvwDpjQGYQbN/PKwNC4wxy:Z6a+pOtEvwDpjtzB

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-08_42f6e8941ac9515bb216944966b56723_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-08_42f6e8941ac9515bb216944966b56723_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1328
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2176

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          95KB

          MD5

          cc76a0ab19ed0e51e777911eda3ce75f

          SHA1

          47b74161a922610c016da353e91d9ede48baa5b7

          SHA256

          dc2785d46dcf81733a86065bf770bdc42f16bff1fbca861bcafea9e1b4c9952f

          SHA512

          5a037ad7805aa7a3d888d5425de8f01f5ed4e5e21f795d632945222ce4db6b1e647d5e9de008a0315641f48213631c1222b37d71610793dcef94e1da30440cba

        • memory/1328-0-0x00000000002C0000-0x00000000002C6000-memory.dmp

          Filesize

          24KB

        • memory/1328-1-0x0000000000310000-0x0000000000316000-memory.dmp

          Filesize

          24KB

        • memory/1328-3-0x00000000002C0000-0x00000000002C6000-memory.dmp

          Filesize

          24KB

        • memory/2176-15-0x00000000004C0000-0x00000000004C6000-memory.dmp

          Filesize

          24KB

        • memory/2176-17-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB