Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10/04/2024, 13:36

General

  • Target

    2024-04-10_85cbce7f89a453f6e3e8eb722db49f83_cryptolocker.exe

  • Size

    71KB

  • MD5

    85cbce7f89a453f6e3e8eb722db49f83

  • SHA1

    90d00b69950fd35c28c18d9d693bc2e263442fd2

  • SHA256

    65c382255951a81ac799c422fdc064128aad5b736de0366fdc2ab69e50d4e380

  • SHA512

    cc7d355b1c11fc4bd7d56d62fc96010e29304b23d6aad98bcdac514bcaec72013edc3a9a8751b31c0a81dacd9390c919574270e4ba4db0011fa2dd33a3bfa7f7

  • SSDEEP

    1536:Dk/xY0sllyGQMOtEvwDpjwycDtKkQZQRKb61vSbgZ3QzNKUNZO6:DW60sllyWOtEvwDpjwF85J

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Detection of Cryptolocker Samples 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-10_85cbce7f89a453f6e3e8eb722db49f83_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-10_85cbce7f89a453f6e3e8eb722db49f83_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2976

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          71KB

          MD5

          d6b6b512aef874b78121fa0a33b643c4

          SHA1

          825358dcb4f1c223d1a4972b37a33eefda812907

          SHA256

          75fa93162110dd02e11bcc45ad5dc2a1c35d0b9a55d5ead8f97d32a2248f5ecf

          SHA512

          8970dbb98952a26c4057f8e7912191d6cf95f32d4de1071d0fc02c0abe1331527af549588ce2b4702f8298a9f8835c089645d185192b5c5b95f99d2f2e105fb7

        • memory/2292-0-0x0000000000500000-0x000000000050B000-memory.dmp

          Filesize

          44KB

        • memory/2292-1-0x0000000000420000-0x0000000000426000-memory.dmp

          Filesize

          24KB

        • memory/2292-2-0x0000000000460000-0x0000000000466000-memory.dmp

          Filesize

          24KB

        • memory/2292-3-0x0000000000420000-0x0000000000426000-memory.dmp

          Filesize

          24KB

        • memory/2292-15-0x0000000000500000-0x000000000050B000-memory.dmp

          Filesize

          44KB

        • memory/2292-13-0x0000000000650000-0x000000000065B000-memory.dmp

          Filesize

          44KB

        • memory/2976-17-0x0000000000500000-0x000000000050B000-memory.dmp

          Filesize

          44KB

        • memory/2976-19-0x0000000000210000-0x0000000000216000-memory.dmp

          Filesize

          24KB

        • memory/2976-26-0x00000000001D0000-0x00000000001D6000-memory.dmp

          Filesize

          24KB