Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    12/03/2024, 07:34

General

  • Target

    2024-03-12_d8e30b06a48c76dd5a9f2cc0ddd7e0e9_cryptolocker.exe

  • Size

    55KB

  • MD5

    d8e30b06a48c76dd5a9f2cc0ddd7e0e9

  • SHA1

    d59a4bc1468862527f2c8f52af462e6a71201c0d

  • SHA256

    9b6ee6f26b635792651b7cbfe95eeb73aa11bff2b735f9aad7330100b1498d8d

  • SHA512

    957b72a5897e9f0da98b9f63736141105e6b662094282e8c13decb20beb6dbf6bfbfdaed9fe2945a089d913c770e368d757da3c5d26fb37b0c6811d5eb0ea893

  • SSDEEP

    768:79inqyNR/QtOOtEvwDpjBK/iVTab3GRuv3VylSV/CCjgd:79mqyNhQMOtEvwDpjBPY7xv3g8Od

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-12_d8e30b06a48c76dd5a9f2cc0ddd7e0e9_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-12_d8e30b06a48c76dd5a9f2cc0ddd7e0e9_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2360
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:3056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    55KB

    MD5

    ab4cac470758457956e5e386e5da6a10

    SHA1

    9192cafe8dfc3b8616105001f986caeb3b3fe53b

    SHA256

    7a71ab762c4a831ef077ee57324830a0df3782f19417e1b1f2d923c6bf1677e1

    SHA512

    dcea301d3b9042666b264ffe96b8afb80ac843038184c3cde334614b57475cb151bcb5fe031188d9552f4c4e4ee3e794e1c50bf998d9194381a5f9ce06651faf

  • memory/2360-0-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/2360-1-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/2360-2-0x0000000000470000-0x0000000000476000-memory.dmp

    Filesize

    24KB

  • memory/2360-9-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/2360-15-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/3056-18-0x0000000000490000-0x0000000000496000-memory.dmp

    Filesize

    24KB

  • memory/3056-17-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/3056-20-0x0000000000450000-0x0000000000456000-memory.dmp

    Filesize

    24KB