Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09/03/2024, 06:29

General

  • Target

    2024-03-09_533e5c4ddd3acc7d077ee7cfda4f1046_cryptolocker.exe

  • Size

    62KB

  • MD5

    533e5c4ddd3acc7d077ee7cfda4f1046

  • SHA1

    be3f342aff3ba851e297437c5b8b3a7e9a0da426

  • SHA256

    c6e1cad6fac2548cd9705134d6b11876ae494d413303c058147a37d0b4d55f55

  • SHA512

    a336a03c5dd52fe3bf062d7fa80c7472c37a2f5432e566b958e8a2877f9488b704b960dc31dd92035f5d4f18d6d6542acdba851d698122c5cb160aaf61810713

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjyaLccVCbmhkJ:V6a+pOtEvwDpjvI

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-09_533e5c4ddd3acc7d077ee7cfda4f1046_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-09_533e5c4ddd3acc7d077ee7cfda4f1046_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2744
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2264

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          62KB

          MD5

          3638293c6c566d6a2ce661b448602d8e

          SHA1

          8fcadaaf83808686e00fe67053c21a2d05c49672

          SHA256

          f13143c747fef9a96c2831db08299d59068f608e327f2471ebc5a2132749cd06

          SHA512

          a223ed582a53bfe3d15e3499e40569105458b1b64ec2b0935072dbfb8f8a6ed102227f28c11fc560581105237ea6075e2a872d726fb6869915dbb0d0680c2dc2

        • memory/2264-15-0x0000000000200000-0x0000000000206000-memory.dmp

          Filesize

          24KB

        • memory/2264-17-0x00000000001D0000-0x00000000001D6000-memory.dmp

          Filesize

          24KB

        • memory/2744-0-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/2744-1-0x0000000000280000-0x0000000000286000-memory.dmp

          Filesize

          24KB

        • memory/2744-2-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB