Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26/03/2024, 04:25

General

  • Target

    2024-03-26_c6ae7a21aa5b3fc191ff258548e6971f_cryptolocker.exe

  • Size

    52KB

  • MD5

    c6ae7a21aa5b3fc191ff258548e6971f

  • SHA1

    4fe7de1190c62215306ed91877cbb107cfe4cb11

  • SHA256

    5826ba1c95b6adaf79041cabb9568d0bde8f2deecfa92a10df11b34b6bdc2785

  • SHA512

    d5b801afd4ab4b58faa5ef8d92f9b2af86ff6814953d289d8ce68698eacc6d986304d507e9e2a7786573a4b4dad3ad312a636b0de898b6c96b86242c4d27ca5e

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/BtOOtEvwDpjBVaD3E09vaTiSfQaV2LL9:X6QFElP6n+gJBMOtEvwDpjBtE1yILL9

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-26_c6ae7a21aa5b3fc191ff258548e6971f_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-26_c6ae7a21aa5b3fc191ff258548e6971f_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:3016

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          53KB

          MD5

          e4bccee38a43ef337b5107e87564a320

          SHA1

          8bede204216e7fa3a5a1f6445851334c932a2af9

          SHA256

          87637632373b865f9c0b4f803b229a482481f2fca6898dae98461a1dc128f04e

          SHA512

          797a625557476314d78dd1511fc5b9aeb16009a55d9cd792ae0367264a6e8ebfe79b4533ec607c27af7a0191184d441fd36497b2fb7aefd6617028f2a68f35f0

        • memory/2188-0-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/2188-1-0x0000000000470000-0x0000000000476000-memory.dmp

          Filesize

          24KB

        • memory/2188-2-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/3016-15-0x0000000000300000-0x0000000000306000-memory.dmp

          Filesize

          24KB