Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05-04-2024 19:36

General

  • Target

    2024-04-05_a2bc6448fb66ebfdde6af1dc3ddfab17_cryptolocker.exe

  • Size

    39KB

  • MD5

    a2bc6448fb66ebfdde6af1dc3ddfab17

  • SHA1

    964ae2d884ca299868b59609d25a5fce9719063a

  • SHA256

    4b7217983e7995b3378f9118351340f3cf232a7639ae2a0df93d19eb6abbaaed

  • SHA512

    1dd546ed1445685f2130dd1b2153d745fbfdc48d06a12934e9942f6e6b3946b8f70e6de42c966ce32de287fcf116e9982702770de5bcd9e2c08bec061118bf0f

  • SSDEEP

    768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpj/MLam5axzYF1:V6QFElP6n+gMQMOtEvwDpjyaYalS1

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-05_a2bc6448fb66ebfdde6af1dc3ddfab17_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-05_a2bc6448fb66ebfdde6af1dc3ddfab17_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2272
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2216

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    39KB

    MD5

    16379a587dba861a0576a7a41155b0a0

    SHA1

    b79fb53811b0a305bcfc482250232021cc87ea16

    SHA256

    4ac538b6ec37b80e8075b3f3ab8c79e498484f613e9e4b49451e32549bd48229

    SHA512

    7afde7d69af591d4c2367b4400fde78f7b6972a9e142f9b105eb44f3b125efbf97094d50f7883b0d038b4256533064a7fd50c2aef59b5ac65cc16a567298c7f2

  • memory/2216-15-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB

  • memory/2216-22-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2272-0-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2272-1-0x0000000000370000-0x0000000000376000-memory.dmp

    Filesize

    24KB

  • memory/2272-3-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB