Analysis

  • max time kernel
    10s
  • max time network
    15s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2024 19:29

General

  • Target

    2024-03-27_51cb8b58e695f8ef7cff4a95e4486b82_cryptolocker.exe

  • Size

    61KB

  • MD5

    51cb8b58e695f8ef7cff4a95e4486b82

  • SHA1

    a8b8640e055b317b7eb4d8cfe34eb6a104f1e2d3

  • SHA256

    1aa8c2c0deb0caffe7999cd1a00867375e79a8b4f0ec6672394d01cb036e23d9

  • SHA512

    4976ac881cc086bd054014a2412e0c2491815b54d9becc8bfdbba25dd48b10dd14fcf208e62cc9838b4cba5131200194f4bb9e8a39ff1e8cdeda595c4d26570e

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsir:BbdDmjr+OtEvwDpjM8m

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 3 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-27_51cb8b58e695f8ef7cff4a95e4486b82_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-27_51cb8b58e695f8ef7cff4a95e4486b82_cryptolocker.exe"
    1⤵
      PID:4004
      • C:\Users\Admin\AppData\Local\Temp\asih.exe
        "C:\Users\Admin\AppData\Local\Temp\asih.exe"
        2⤵
          PID:1868

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\asih.exe

        Filesize

        61KB

        MD5

        a45d9aca585b6450030190b951a9ff7c

        SHA1

        33030b00c3fc2503c8c9e38419f820e151db91a1

        SHA256

        68bd56758a73e360278f63119c1f8a23aedd9606a6f97aed9fe8f2310b40cedc

        SHA512

        ff93cd771f5038f9426d8a0bd6ff07b03d13853c9bbfb8c2d91bd25e7df2c6c2b7734805db6b9954e2e7b7457782d10a8d6a291995fa7ae2784d12faedd2ffea

      • memory/4004-0-0x0000000000500000-0x0000000000510000-memory.dmp

        Filesize

        64KB

      • memory/4004-1-0x00000000021C0000-0x00000000021C6000-memory.dmp

        Filesize

        24KB

      • memory/4004-2-0x00000000021C0000-0x00000000021C6000-memory.dmp

        Filesize

        24KB

      • memory/4004-3-0x00000000006B0000-0x00000000006B6000-memory.dmp

        Filesize

        24KB

      • memory/4004-17-0x0000000000500000-0x0000000000510000-memory.dmp

        Filesize

        64KB