Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15-04-2024 09:31

General

  • Target

    2024-04-15_1c0137b78391abadb9761c040b566331_cryptolocker.exe

  • Size

    62KB

  • MD5

    1c0137b78391abadb9761c040b566331

  • SHA1

    0e4e2991d72a83ef76f5ec901f6d02b87ba92716

  • SHA256

    4006faa00871b765909871f010c0aaae234463d8c91732375c5d18391afb6ea6

  • SHA512

    208f790a72beeedaabdbf1f99d63f9a6e4b546a569123e8bbccb144da5f4f0a0ae03e07d9261a23b2d5f0608fe3a85709d624223bd731d1b610c7cd3bf41b6ff

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsiP:BbdDmjr+OtEvwDpjM8a

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Detection of Cryptolocker Samples 3 IoCs
  • UPX dump on OEP (original entry point) 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-15_1c0137b78391abadb9761c040b566331_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-15_1c0137b78391abadb9761c040b566331_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:1640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    62KB

    MD5

    eb405c7876e29bd9c443402054d4fb6b

    SHA1

    403cc56cb9f4430606f5c89e952123252e453e4d

    SHA256

    9f4ed5f15034fb3bea7d950e31f5347ed94db387333f19dc43611ac825a97783

    SHA512

    534c9e320a5bb55c89083f800eb5deaa1989388564d32fa15a958785fcbdaed64d1496792d9fa175fb10bacdd555e9f983a6ac8e724d27039fbf39d8c6676aa7

  • memory/1640-16-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/1640-19-0x0000000000270000-0x0000000000276000-memory.dmp

    Filesize

    24KB

  • memory/1640-18-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/1640-26-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2364-0-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2364-1-0x0000000000320000-0x0000000000326000-memory.dmp

    Filesize

    24KB

  • memory/2364-2-0x0000000000390000-0x0000000000396000-memory.dmp

    Filesize

    24KB

  • memory/2364-8-0x0000000000320000-0x0000000000326000-memory.dmp

    Filesize

    24KB

  • memory/2364-15-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB