Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    18/03/2024, 22:38

General

  • Target

    2024-03-18_af523b84faed36747a810ac0237402fb_cryptolocker.exe

  • Size

    96KB

  • MD5

    af523b84faed36747a810ac0237402fb

  • SHA1

    d881f494c23580269807b85218a04898e405ad7e

  • SHA256

    24fbb8f5ea060cc6220306d8a53987eaf60f9809bf03f2b95a45b27ea0d2c6cc

  • SHA512

    5f7d9a23ccd4dc47cadd33ac5b2fe05e6c04976de42f20645461a2e1ed2eeb08b257db6b19aa1b71b7814180fb16a386e7bf0bd2c52a13a4fba0e0ca831b1ad0

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjQGYQbN/PKwNgpUF:V6a+pOtEvwDpjtz3

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-18_af523b84faed36747a810ac0237402fb_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-18_af523b84faed36747a810ac0237402fb_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2336

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    96KB

    MD5

    28ce5d6a2d43f2fedc03931de0eaacee

    SHA1

    c516114f9b893582856d98fd68f72b560a838e7c

    SHA256

    55e4ca6ab3a7f21d354dfb372b99b79afcce5b873c44f38f7ffc22f0f760d07b

    SHA512

    883cb6bc8ee6890d254747647a5704bcb4360f31c52e5d2d6f5f0265c1cb13a2556049a1efe70b6cc97b233084117942f650ebb65780583e26f6ca2491ae4a3c

  • memory/1948-0-0x0000000000300000-0x0000000000306000-memory.dmp

    Filesize

    24KB

  • memory/1948-1-0x00000000004A0000-0x00000000004A6000-memory.dmp

    Filesize

    24KB

  • memory/1948-7-0x0000000000300000-0x0000000000306000-memory.dmp

    Filesize

    24KB

  • memory/2336-16-0x00000000002A0000-0x00000000002A6000-memory.dmp

    Filesize

    24KB

  • memory/2336-15-0x00000000001E0000-0x00000000001E6000-memory.dmp

    Filesize

    24KB