Analysis

  • max time kernel
    135s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    14/03/2024, 15:51

General

  • Target

    2024-03-14_c8b54b9a5696cba9aa572605b7be69f5_cryptolocker.exe

  • Size

    42KB

  • MD5

    c8b54b9a5696cba9aa572605b7be69f5

  • SHA1

    aa0c189906106289b178db272c5db057883bbc8f

  • SHA256

    679c9c7e336690ac6c011efc3b81619b0bbadbe3c6c66aa85c25f7bc6100f3b6

  • SHA512

    094b027b5731dc15f567fa968c2a8c22cd2abd97cfed17dd2e2bc091e9629a439f75a9745557ec6f4f5cf4a31fcf85f462a952648e5b85e87f3fee2e57ec38ba

  • SSDEEP

    768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpj/MLam5aFr7YOzzb5:V6QFElP6n+gMQMOtEvwDpjyaYaFAY

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-14_c8b54b9a5696cba9aa572605b7be69f5_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-14_c8b54b9a5696cba9aa572605b7be69f5_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1460
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2500

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          42KB

          MD5

          cb6468a4251157f3f0b4273ac32dcc02

          SHA1

          6bc3779c616bf37d5d7d0b81794531bee804e712

          SHA256

          ef34f4d838e3d8192307f8111af1f1bff9d1b77b2276c51d32f2166f46ea0fd8

          SHA512

          0a8497453e40c000dee82c8dcf11a25c15dff3e83ad0444c471b4db766407c6f9787625277a1f32d55ba896e9a26596902ed31bd3aca112252ec30d43d1feec2

        • memory/1460-0-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/1460-1-0x0000000000270000-0x0000000000276000-memory.dmp

          Filesize

          24KB

        • memory/1460-3-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/2500-16-0x0000000000200000-0x0000000000206000-memory.dmp

          Filesize

          24KB

        • memory/2500-15-0x00000000001D0000-0x00000000001D6000-memory.dmp

          Filesize

          24KB