Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    14-03-2024 06:03

General

  • Target

    2024-03-14_4f769a489c0eb7296ce9b2ab11b6d07b_cryptolocker.exe

  • Size

    68KB

  • MD5

    4f769a489c0eb7296ce9b2ab11b6d07b

  • SHA1

    28c7f52de67e2268ed17fea6c661a1ef828a633c

  • SHA256

    bea2b95e81d05c023ea3ec160d9984d1d26d539abbca0a32177096490c254cd2

  • SHA512

    bb628ddcf7e2c59dc64b47e86ad85b07d8e1d87e21e0fe323d31d658ebc6fe2929088717b30aa767606f6f02e8037f372917863359703587ce043b3249ad80ca

  • SSDEEP

    1536:Dk/xY0sllyGQMOtEvwDpjwycDtKkQZQRKb61vSbgZ3QzNKUj:DW60sllyWOtEvwDpjwF85N

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-14_4f769a489c0eb7296ce9b2ab11b6d07b_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-14_4f769a489c0eb7296ce9b2ab11b6d07b_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2312
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    68KB

    MD5

    75ed3205cb95062e6c2bda7b73c6c28c

    SHA1

    f245db78f33974f60e04656d8cdb4eab00f3cd86

    SHA256

    10ee427b0a5ed0b2c29edcc8f52199521ee8f8f985cafb3ac8efa41d1093039b

    SHA512

    9edbd71d3e99343238d4b2b980b4cf630a35edba900b3fbbe406df424efcbe325f925f2d23952622ab975af1803332bc0ca9e764f8c9e47cf9d4c7315a4cf613

  • memory/2312-0-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/2312-1-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2312-3-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2312-2-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/2312-15-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/2828-16-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/2828-19-0x0000000000360000-0x0000000000366000-memory.dmp

    Filesize

    24KB

  • memory/2828-18-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB