Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16-03-2024 06:07

General

  • Target

    2024-03-16_30c17745d47cba796a4af0c885e6a2ad_cryptolocker.exe

  • Size

    95KB

  • MD5

    30c17745d47cba796a4af0c885e6a2ad

  • SHA1

    55e4a1930b612844694f45896b98f57a2b3f9da4

  • SHA256

    6d78d2c984f1fcc952b83bc188f4464998fe406b987892fb6b9e0740a7fd72d4

  • SHA512

    7c41fae35a8911ce22edc3a77b8169f3902b0b4c84c4b91d68bfb52ab3e7f5106602384812bff393b4f189dda6daf89c10a5f74abc9f8ad973e6825e004606be

  • SSDEEP

    1536:Z6QFElP6n+gMQMOtEvwDpjQGYQbN/PKwNC4w7:Z6a+pOtEvwDpjtz2

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-16_30c17745d47cba796a4af0c885e6a2ad_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-16_30c17745d47cba796a4af0c885e6a2ad_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1320
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2296

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    95KB

    MD5

    595ae40d6a73deb40c2936f7d3b42469

    SHA1

    6e04fc4038238d44a629a1368ec65882f5cfd410

    SHA256

    405da4ae6286cb3c2f747c87b26a49225f4cd18fc057b9072658ae34d378ef2d

    SHA512

    cfe57576f86d20b8e4f374f3fd1469c26f684a416e84c3e6373694bf9c3f3f2509d2b8e54a72f6f5ed8766adc251329951ce79181af55c056b652c4168846b20

  • memory/1320-0-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/1320-1-0x00000000002F0000-0x00000000002F6000-memory.dmp

    Filesize

    24KB

  • memory/1320-2-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/2296-15-0x00000000004B0000-0x00000000004B6000-memory.dmp

    Filesize

    24KB

  • memory/2296-16-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB