Analysis

  • max time kernel
    149s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    19-03-2024 17:41

General

  • Target

    2024-03-19_7793d596fd35cbf5e62523f306948671_cryptolocker.exe

  • Size

    64KB

  • MD5

    7793d596fd35cbf5e62523f306948671

  • SHA1

    dc430719c6d05b961ae7e5e4fec6702dc2447159

  • SHA256

    24680617c1d0896f1df95fb107afa144967c767240c167fb20b1f562d43ee98e

  • SHA512

    c963b2a03440079a02e991713c339fa68e390bf863ac3041fa2426260a760871373ceed5f209e8be896d1b64ca457e02833b48d66ce6e54f96fcb42365b42974

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjyaLccVCbmhGQIp:V6a+pOtEvwDpjvi

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-19_7793d596fd35cbf5e62523f306948671_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-19_7793d596fd35cbf5e62523f306948671_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2944
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    64KB

    MD5

    eb3b948edc7fe2c244176838b7a884b4

    SHA1

    9e9e08c8cea08ea45e71440c7b790dc0e7f40277

    SHA256

    75b1e093eb4a5ca88a2812f7b86497941c9bae11c813b7bbd0a88c50af84b0b6

    SHA512

    de553b33a77f1cc7ee454d71c879599362deea8cce70ac35e26e9c3650c976483ad8848994f42e33b58306ab72edc19db0bff71db406026931e587e377da8946

  • memory/2764-15-0x0000000000290000-0x0000000000296000-memory.dmp

    Filesize

    24KB

  • memory/2764-17-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2944-0-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/2944-2-0x0000000000300000-0x0000000000306000-memory.dmp

    Filesize

    24KB

  • memory/2944-1-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB