Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240319-en
  • resource tags

    arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system
  • submitted
    26-03-2024 12:06

General

  • Target

    2024-03-26_fbe4159e31e0942ec8048a7658b48be7_cryptolocker.exe

  • Size

    75KB

  • MD5

    fbe4159e31e0942ec8048a7658b48be7

  • SHA1

    3a9db157261305844f8c0d730da8a54f97e4e8fb

  • SHA256

    5f7e3217097d7551a4b3230767b8fd653a4a748b616323d34b6a79fc7d145135

  • SHA512

    00801cf414b0298c0c28119bb9c73b0b350f165cb5f6b08a8a6f76d48e8ed10127675e8b2d9c20fa22387a0d5c2272d5bf6d7f518ea6fc691d6dc2f03c90d668

  • SSDEEP

    1536:X6QFElP6n+gJQMOtEvwDpjBZYTjipvF2bx1RUr:X6a+SOtEvwDpjBZYvQd2q

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-26_fbe4159e31e0942ec8048a7658b48be7_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-26_fbe4159e31e0942ec8048a7658b48be7_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2144
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2988

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    75KB

    MD5

    21e4c9dc8cde29754e67b503382043ca

    SHA1

    d4cbaa5d36036403869b8b848336743ba6721f8e

    SHA256

    ebaa7954364f363c4a6ca21d4358db3c1dad1377ca3f09c6ac4ce30e9dc41c12

    SHA512

    98fc1063d06924b7d91f461168bad70dfe417092fcbb0e3fbe3929a166729d86605e8bac3a4c1eca169ba2c83c4991c9a24baa5933530a2d07a24cdd817deaf8

  • memory/2144-0-0x0000000000420000-0x0000000000426000-memory.dmp

    Filesize

    24KB

  • memory/2144-1-0x0000000000420000-0x0000000000426000-memory.dmp

    Filesize

    24KB

  • memory/2144-2-0x0000000000450000-0x0000000000456000-memory.dmp

    Filesize

    24KB

  • memory/2988-15-0x0000000000490000-0x0000000000496000-memory.dmp

    Filesize

    24KB

  • memory/2988-19-0x0000000000360000-0x0000000000366000-memory.dmp

    Filesize

    24KB