Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    17/04/2024, 15:35

General

  • Target

    2024-04-17_87307b110ddb0f43a7c1946c8100efef_cryptolocker.exe

  • Size

    39KB

  • MD5

    87307b110ddb0f43a7c1946c8100efef

  • SHA1

    36b2768be7d64e95d6ada1540572c236646d2a8c

  • SHA256

    c17b90434e71d60695070efd00fbbce84fd5b67bd4afda4b7d9b535d063b8bec

  • SHA512

    d53a0057cb69b4896e65749f62a8e27606121f38c10178d63a52e60dc44faa7b2ffec2bc354ca4ef504147a2188be9ae467041bc67affd0c00c05eba231b8a62

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBaac4HKcfrl:X6QFElP6n+gJQMOtEvwDpjBsYK6rl

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-17_87307b110ddb0f43a7c1946c8100efef_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-17_87307b110ddb0f43a7c1946c8100efef_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:1972

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          39KB

          MD5

          fae9b91c30c3c727fa650463c5399445

          SHA1

          e7893c56e228d95909fb9cd298eeb7fca19a7b08

          SHA256

          9330b241af2389fb4cf76ccd7274750cf27a651eff40584a39db46d1489859e9

          SHA512

          93715eb2fcc3afde7d9a1b30fe7c40443089d2045ad4bcee98aa848700d2c5393ca2a7a2609d6cce4d5048d165c87e88ecca78bfff670cef94cab6ac4213e79d

        • memory/1972-15-0x0000000000280000-0x0000000000286000-memory.dmp

          Filesize

          24KB

        • memory/2032-0-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/2032-1-0x0000000000270000-0x0000000000276000-memory.dmp

          Filesize

          24KB

        • memory/2032-2-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB