Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240319-en
  • resource tags

    arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system
  • submitted
    28-03-2024 00:24

General

  • Target

    2024-03-28_06763d8bc80fa6f852cb79f627d71406_cryptolocker.exe

  • Size

    123KB

  • MD5

    06763d8bc80fa6f852cb79f627d71406

  • SHA1

    2ec1a7fe5852b30321731dfedecac51ad559e76d

  • SHA256

    6f0e5fcff4aaeb2024106c981eb3ba407b4915a17cbc26e7d608045212e194cf

  • SHA512

    c791f38e7d7eda7a58dc9d8ae7aef547c1b657a5aad3726fb5328662747cc263f83cce8c90a3a1fd4a15d195b703953dcd2c6fc5ef996f49ef0534d246ac091a

  • SSDEEP

    1536:u6QFElP6n+gWMOtEvwDpjJGYQbN/PKwMgm:u6a++OtEvwDpj6za

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-28_06763d8bc80fa6f852cb79f627d71406_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-28_06763d8bc80fa6f852cb79f627d71406_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2496
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    123KB

    MD5

    d33065ed178a265ff93805344e9c0432

    SHA1

    a70063076e2ec8a098d2dd34b647e0fa33d9ba26

    SHA256

    4bbec151e4f046ce6323678a240097b3d78011c678a73c045444a74abccebf88

    SHA512

    0a5bad0669e328f6ea893ca1fbadfbec63586e78597cd5a8ae7df07faae3d46e1e6c2b83218793b5cee8749a5fee1b5446d3625015eb14ab2f3a6abb0f57e113

  • memory/2496-0-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB

  • memory/2496-1-0x0000000000600000-0x0000000000606000-memory.dmp

    Filesize

    24KB

  • memory/2496-2-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB

  • memory/2744-15-0x00000000004A0000-0x00000000004A6000-memory.dmp

    Filesize

    24KB

  • memory/2744-18-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB