Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    17/04/2024, 03:43

General

  • Target

    2024-04-17_58a51d31964b2eaa67f18dc23efcb991_cryptolocker.exe

  • Size

    40KB

  • MD5

    58a51d31964b2eaa67f18dc23efcb991

  • SHA1

    1f57f32a26ebc5578cdce2f0ec4b3d1f50e442a1

  • SHA256

    84de364e6524e231212899bf614bdde954f407a5727e139882567643b434207d

  • SHA512

    1bae50cc7a68a7941bbb1224f6c83950ca96f7e3d3635e44b4d7673305a409dab1a7fff14f1cb8d2380ff3c048f96cb407defecae809b1751d9ac80cafcbc774

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBaac4HKcfrW:X6QFElP6n+gJQMOtEvwDpjBsYK6rW

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-17_58a51d31964b2eaa67f18dc23efcb991_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-17_58a51d31964b2eaa67f18dc23efcb991_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1032
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:1028

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          40KB

          MD5

          609ae5822c07d332743c11bc7bf076d5

          SHA1

          89792072f471360da4b533e82e912bdfbaf58b4d

          SHA256

          be881711d552177aa2c9f2290963c311f3de0fdd252fa67ced9ce92c621f93fb

          SHA512

          83eb944540ca5a7171f204c9243a9e077fffe66978f12dd2180b15be3b2348109eb2045f3046860361fa546e04cc50ddf8395d5ad65f0f984b491b4dc26ddeb0

        • memory/1028-15-0x0000000000380000-0x0000000000386000-memory.dmp

          Filesize

          24KB

        • memory/1028-21-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/1032-0-0x00000000003C0000-0x00000000003C6000-memory.dmp

          Filesize

          24KB

        • memory/1032-1-0x00000000004D0000-0x00000000004D6000-memory.dmp

          Filesize

          24KB

        • memory/1032-3-0x00000000003C0000-0x00000000003C6000-memory.dmp

          Filesize

          24KB