Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    13/03/2024, 20:47

General

  • Target

    2024-03-13_fa7e1d1d664a31cf6a7e5ac35581725a_cryptolocker.exe

  • Size

    105KB

  • MD5

    fa7e1d1d664a31cf6a7e5ac35581725a

  • SHA1

    c2124f9bbd70e93b263f369935ce5bc1378778e8

  • SHA256

    3cca4ac9194d9754390ca87fe565eb0069d5967f77d32e508e451199a2664f7c

  • SHA512

    e3b3ef84703a8a0ce300bcf1362ccf519582c7eebd0c03906816def42ee5c5a95f39a1773e226a7c24525e468e2c1e036d39760a030c5826a47f03e1e6871035

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjQGYQbN/PKwNgpQbCJhH7:V6a+pOtEvwDpjtzO

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-13_fa7e1d1d664a31cf6a7e5ac35581725a_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-13_fa7e1d1d664a31cf6a7e5ac35581725a_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1660
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:3004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    105KB

    MD5

    fd596877624bc2c4b2951d148ceb1ed2

    SHA1

    f27e70d97f5f76391fc112fedb993bf915eca2d7

    SHA256

    cf9308081a2a72490a97df69327bfaa655ee93e7cdb2d91d654366dfa4f19fa4

    SHA512

    c86cbf7d9be95f922d3b0d5a3b149fe51d4b107e597f18a2c5209515349b42f28c6644d763304b999d09ef07363ef2a95b5256a986b449e65070ce12693c8cef

  • memory/1660-0-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/1660-1-0x0000000000480000-0x0000000000486000-memory.dmp

    Filesize

    24KB

  • memory/1660-8-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/3004-15-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB