Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    15/03/2024, 07:36

General

  • Target

    2024-03-15_8e15acd883955f8c2b6d84a8ed8d9676_cryptolocker.exe

  • Size

    122KB

  • MD5

    8e15acd883955f8c2b6d84a8ed8d9676

  • SHA1

    ab4d477aac7429bbf5881de67bbe984d9c262212

  • SHA256

    35f8a4328b35a6f226e8865038b607f29ef28d2bd6e2059c07161447ccf2d54f

  • SHA512

    43727f1803f9bcf405412874c8e2caa5acd089116d55b6356f2f71214efbc9778a5936706e467a14f68ea03f86865884040d72f0fb0fc5bba3adffa379f75177

  • SSDEEP

    1536:u6QFElP6n+gWMOtEvwDpjJGYQbN/PKwMg5:u6a++OtEvwDpj6zt

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-15_8e15acd883955f8c2b6d84a8ed8d9676_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-15_8e15acd883955f8c2b6d84a8ed8d9676_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3028
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:3012

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          122KB

          MD5

          9a1ba50004a44b18752f02202d968340

          SHA1

          357292ef4e020cad2caddb257330bbbc85ea49a8

          SHA256

          2f79652305ca68c53607f3e0ac91df6f0ba990df3e1dba4351cc6ea878b969c5

          SHA512

          ea8fdefc20d90d7eb037dc919c5cbf4f9d6962641893443ad17d14660550e0ea35bf27bb4d422b9bd01c65153fa80bcb804a9ce164ffe269b8617946fa053bd7

        • memory/3012-15-0x0000000000340000-0x0000000000346000-memory.dmp

          Filesize

          24KB

        • memory/3012-17-0x0000000000300000-0x0000000000306000-memory.dmp

          Filesize

          24KB

        • memory/3028-1-0x0000000000470000-0x0000000000476000-memory.dmp

          Filesize

          24KB

        • memory/3028-0-0x00000000002C0000-0x00000000002C6000-memory.dmp

          Filesize

          24KB

        • memory/3028-8-0x00000000002C0000-0x00000000002C6000-memory.dmp

          Filesize

          24KB