Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    04/04/2024, 22:32

General

  • Target

    2024-04-04_9babdea2fb081f3221f91b7c4065f968_cryptolocker.exe

  • Size

    49KB

  • MD5

    9babdea2fb081f3221f91b7c4065f968

  • SHA1

    9fe3cc32d40d0930cf62e4c7d0c10f9809ad3191

  • SHA256

    289553cf15469c4628d2e04225fe25386a4a401b8b182e8488cacc9887ce40e6

  • SHA512

    45970afe75e347987127ebf1202c719c1860a850448026da412553254a793469ce01c6200b4d302f93132b2d460e835da91f3844af359bc53b2f9203999c00d0

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBaaEqbIu55id3AMWZcL:X6QFElP6n+gJQMOtEvwDpjB0GIWiWLOL

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-04_9babdea2fb081f3221f91b7c4065f968_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-04_9babdea2fb081f3221f91b7c4065f968_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2116

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    49KB

    MD5

    f82afc81535ec9c23d3f06e02401485c

    SHA1

    d9f9e1126803674abb979d4f3377ec6a5e1c9322

    SHA256

    609fe55c9ecb8d254f2e2b9c6298f8acf4aa35bef7bb63c282dfb2da08fba45f

    SHA512

    ec296d8d19849090b1bf06df268957d9ed4282bdb8cef9ffe3fa650006a32d9dff4a5d78428328121463e13532dca7e2f353a67a29288c25cf751ed48cbe21c9

  • memory/2116-22-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2116-15-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/2208-8-0x0000000000420000-0x0000000000426000-memory.dmp

    Filesize

    24KB

  • memory/2208-1-0x0000000000460000-0x0000000000466000-memory.dmp

    Filesize

    24KB

  • memory/2208-0-0x0000000000420000-0x0000000000426000-memory.dmp

    Filesize

    24KB