Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09/04/2024, 01:34

General

  • Target

    2024-04-09_4839cfbf902c0cc90d046fce3189db70_cryptolocker.exe

  • Size

    57KB

  • MD5

    4839cfbf902c0cc90d046fce3189db70

  • SHA1

    ec3aa68a2ef129a3d6273175e5814f1105967b93

  • SHA256

    a8f53fe4a6015f5225c4245a53873ef36d378287d8dfae8abe978d8e7712c381

  • SHA512

    cd9920be47148a11fe027c21008fd74b3a2d35b05ef6a0a8ee05ded9119b9e5310c0d60d3d21d33e2d713e55fa1bd1f57eda024eed198ca43069b478f8e37eb9

  • SSDEEP

    1536:X6QFElP6n+gJQMOtEvwDpjBccD2RuoNmuBLlH9xe:X6a+SOtEvwDpjBrO+

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-09_4839cfbf902c0cc90d046fce3189db70_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-09_4839cfbf902c0cc90d046fce3189db70_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2856
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:1356

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    57KB

    MD5

    72be5e6b950463c8734064be6f457cd0

    SHA1

    fea8dec3e549e8e52733295a17aaf3d58ea8d3f5

    SHA256

    56221faf8ca62ab5c323104266b76ae7c20d15fdd359a8f1cafb7f43f7450730

    SHA512

    0d9c72cb9e442e8c1462e7993cedc9d37523718524d188cf47ad4510a40b11f2cec9dbb3479a93b184cc28508c05f3acbc9911b9f788db4cb57a76bcf8ba3f7f

  • memory/1356-15-0x0000000000470000-0x0000000000476000-memory.dmp

    Filesize

    24KB

  • memory/1356-17-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2856-0-0x0000000000420000-0x0000000000426000-memory.dmp

    Filesize

    24KB

  • memory/2856-1-0x0000000000460000-0x0000000000466000-memory.dmp

    Filesize

    24KB

  • memory/2856-8-0x0000000000420000-0x0000000000426000-memory.dmp

    Filesize

    24KB