Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    14/03/2024, 15:57

General

  • Target

    2024-03-14_f9823f3ece484a572a6e9994720d8a78_cryptolocker.exe

  • Size

    91KB

  • MD5

    f9823f3ece484a572a6e9994720d8a78

  • SHA1

    ebe1d834db7ceb4efbbab1498b7c5ea2478ccbdf

  • SHA256

    8f2ff27b165f9182b5b2572d801616e9d061237dd63e27371d0a1a97e2b628d1

  • SHA512

    085d66cbe4646a9e5dc9ad28ac211ece6f7ab8678c15eb450dbb3e03565ce1a877203a67e250824e53ef79ad820ada30624afbbc22001074fb72fc08c474b23a

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjQGYQbN/PKwMgp:V6a+pOtEvwDpjtzl

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-14_f9823f3ece484a572a6e9994720d8a78_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-14_f9823f3ece484a572a6e9994720d8a78_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2484
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:3012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    91KB

    MD5

    098a667d66312eef4bae9cffadbba1ae

    SHA1

    9d72c81f46d2c1a1481f81ce79360a8959202786

    SHA256

    6ee90cfac2e71ded41815a767c3c021f0fba5a2d95e616492692da1e67582807

    SHA512

    b7654b90dc992cb2701cb7b82cfd6aff4424870a066be2272a3efd9c8011fb1bf685255beafbc9411611895ecef91a704be7b417a0d4e285768dc8eb289e624d

  • memory/2484-0-0x0000000000420000-0x0000000000426000-memory.dmp

    Filesize

    24KB

  • memory/2484-1-0x0000000000450000-0x0000000000456000-memory.dmp

    Filesize

    24KB

  • memory/2484-2-0x0000000000420000-0x0000000000426000-memory.dmp

    Filesize

    24KB

  • memory/3012-15-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB

  • memory/3012-16-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB