Analysis

  • max time kernel
    150s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29-03-2024 04:13

General

  • Target

    2024-03-29_f7cedc1412c1b189fadc8566960348f4_cryptolocker.exe

  • Size

    73KB

  • MD5

    f7cedc1412c1b189fadc8566960348f4

  • SHA1

    dae6c11a12084dd482d34a1b4138dd79b4fb8601

  • SHA256

    3bbbd080c6ea0da2a3339cf18e1cff0d0fe1a8d1a0be4cfa792c1b0dafa48e24

  • SHA512

    9128e30003b74163219c471b89cee947db67b0a52b462cab1406015a969a5d322772de8457f07b850177b4bc6c68865aedd9cc6c3c9567f88eaf781f1e4fa51e

  • SSDEEP

    1536:X6QFElP6n+gJQMOtEvwDpjBZYTjipvF2bx1rHMP:X6a+SOtEvwDpjBZYvQd2Q

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-29_f7cedc1412c1b189fadc8566960348f4_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-29_f7cedc1412c1b189fadc8566960348f4_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2660
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    73KB

    MD5

    1f86fe8372b0c72c67f7aae5bda0179c

    SHA1

    54900ad5a0d7fb412bfdf4df30c8ec5e899e3047

    SHA256

    65cbb5f0edff0956e0ac21d98f23851125d2fb6a44a13e680e7795626ef0edca

    SHA512

    9e1faca111ecb51ec160101920b941aa33cd53ecb3df1da846c64b4436cb526642bd3b35c06058a4736328f151110a554311845179b48a57e4f12d8fcbf5df89

  • memory/2632-15-0x0000000000360000-0x0000000000366000-memory.dmp

    Filesize

    24KB

  • memory/2632-17-0x0000000000320000-0x0000000000326000-memory.dmp

    Filesize

    24KB

  • memory/2660-0-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2660-2-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2660-1-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB