Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    17-04-2024 03:27

General

  • Target

    2024-04-17_0a314df003a5b758d63516053ce90435_cryptolocker.exe

  • Size

    39KB

  • MD5

    0a314df003a5b758d63516053ce90435

  • SHA1

    ca72001f3d66c6cc523e45a0648410a19cbebf2a

  • SHA256

    43cf29fe08a46b2229477aba71080b49947eeaf552ceb80e477f5c90aef2594c

  • SHA512

    228f51e86b430e883f4f18f9ed5b0feca863317a85387be673563a0211f082d5f9c89688df37ced0bd297ed644145c8593eaf676c5697c3f5dd92919389ccebc

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBaac4HKcfrA:X6QFElP6n+gJQMOtEvwDpjBsYK6rA

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-17_0a314df003a5b758d63516053ce90435_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-17_0a314df003a5b758d63516053ce90435_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2144
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2000

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    40KB

    MD5

    f9f8b0b546324c0c868b9c52b469214d

    SHA1

    f6ea92a0bd314086945c54389eb2235d1eaba492

    SHA256

    9e0d79f528536b56c440e5b86203d506fea603fa3f5f158b1f3c400c8e29d233

    SHA512

    b2b60498e52ba5a77e64d2eb5209829b4c243440231d7d84853b75e4507244980c1ce70ab7dfe690af8030d732478b79c91b52d1f7eec23f5699d03b78240be1

  • memory/2000-15-0x0000000000460000-0x0000000000466000-memory.dmp

    Filesize

    24KB

  • memory/2000-17-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/2144-0-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2144-1-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/2144-8-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB