Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08-03-2024 12:39

General

  • Target

    2024-03-08_5e96bc43d730b8f8e677b0646daea362_cryptolocker.exe

  • Size

    50KB

  • MD5

    5e96bc43d730b8f8e677b0646daea362

  • SHA1

    d6b415671328d328bd6a8c47de412f4557244a0f

  • SHA256

    c07b7d878d8e0238fe87c26cf56bec6b1aeea2d0385d161cf44d88b1cf7d2ee3

  • SHA512

    668449dd169698ac3c999fd09923707e6fbc53c195469e658f3adfb587e685faa188e617b5b8f4a4ede861d8edcb6d4db28f8d53de29de5457102a65eccee757

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/BtOOtEvwDpjBVaD3E09vxmlcXF:X6QFElP6n+gJBMOtEvwDpjBtExmlE

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-08_5e96bc43d730b8f8e677b0646daea362_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-08_5e96bc43d730b8f8e677b0646daea362_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2328

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    50KB

    MD5

    96448ee55e64108daeffda5460e92d5f

    SHA1

    a1a5cf8c7cdbc63afa546baf4f1b15534a29bf3f

    SHA256

    d22bdee1f5d23239f4a0cea45f616365ca2a39a231ded0bda3250e3b1143bc3f

    SHA512

    4460c07a391d9647ffe44ba34b66c07c4aede14ff81a715fe5e3c10ff037c9c0656aeb66148a53f8660765bc948e7277bc5ff663a81d4cd53e7745efe8187388

  • memory/1740-3-0x00000000002D0000-0x00000000002D6000-memory.dmp

    Filesize

    24KB

  • memory/1740-1-0x0000000000600000-0x0000000000606000-memory.dmp

    Filesize

    24KB

  • memory/1740-0-0x00000000002D0000-0x00000000002D6000-memory.dmp

    Filesize

    24KB

  • memory/2328-20-0x0000000000320000-0x0000000000326000-memory.dmp

    Filesize

    24KB

  • memory/2328-15-0x0000000000360000-0x0000000000366000-memory.dmp

    Filesize

    24KB