Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240319-en
  • resource tags

    arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system
  • submitted
    15-04-2024 11:42

General

  • Target

    2024-04-15_6409de6ec0952f0445d63163e70d08b3_cryptolocker.exe

  • Size

    50KB

  • MD5

    6409de6ec0952f0445d63163e70d08b3

  • SHA1

    424ef9eae4bb8d9a221d13d5c29f9bb1c3965ed7

  • SHA256

    8e769e8c8fdd8ee323d41223fb1b0a01a7b81d608931fbaa44f93713cac61745

  • SHA512

    372348a976a93e706d2999d9dfea70cc88617c73daf9bdc21ce229d3f741a873375714807145a7ff3637a6f80571190e2044279e6a8b5b5445fde7b3a071e6c5

  • SSDEEP

    768:79inqyNR/QtOOtEvwDpjBK/rJ+Nw8qnTHGfg:79mqyNhQMOtEvwDpjBxe8GGfg

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-15_6409de6ec0952f0445d63163e70d08b3_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-15_6409de6ec0952f0445d63163e70d08b3_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1192
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2000

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    50KB

    MD5

    ecd5b762d9b9ae541f0e126915372251

    SHA1

    8c0dcac656e50987521d346e80f0d51d7c83bd9d

    SHA256

    dede36263a67355081d6abe90a7947385bd81dbbb69904fcb6acf1a3c7b42582

    SHA512

    aabad6b4afca9fb0baf5d2b0a9c0a39c37a72b36721ee2d69fd6d512b9ed3719fe982ee26ecf19b29d1b095f1c9b86810bc14c1323c457c75faddbde829efb65

  • memory/1192-0-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/1192-1-0x00000000001E0000-0x00000000001E6000-memory.dmp

    Filesize

    24KB

  • memory/1192-2-0x00000000001E0000-0x00000000001E6000-memory.dmp

    Filesize

    24KB

  • memory/1192-3-0x0000000000290000-0x0000000000296000-memory.dmp

    Filesize

    24KB

  • memory/1192-16-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/2000-15-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/2000-18-0x0000000000370000-0x0000000000376000-memory.dmp

    Filesize

    24KB

  • memory/2000-20-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB