Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    20/04/2024, 23:30

General

  • Target

    2024-04-20_4c988ebe76dd482c4ff3b1b1c3a2899f_cryptolocker.exe

  • Size

    46KB

  • MD5

    4c988ebe76dd482c4ff3b1b1c3a2899f

  • SHA1

    b969447bde10e25ae356b6474af1bb93c868d1db

  • SHA256

    6c643d472ea2d49af2cf07145625ee0eb51bc0e90674b555f71ff8a6e04ad8fd

  • SHA512

    a4f7b62e5a145beabf6ba46a9646017b7c4da5a7641a7cdffd96fa353ca4ebaca9b6d145a1fcaaa06a5a4b489c6155ba9bcb233ad0e5e75dd7979ed8f52d3748

  • SSDEEP

    384:e/4wODQkzonAYsju5N/surDQtOOtEvwDpjqIGROqS/WccJVJwi2B5oCCM8CLW2VT:79inqyNR/QtOOtEvwDpjBKccJVODvy3e

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-20_4c988ebe76dd482c4ff3b1b1c3a2899f_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-20_4c988ebe76dd482c4ff3b1b1c3a2899f_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2792
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2236

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    46KB

    MD5

    954289206048e154eefd51a975004baa

    SHA1

    832c9dbfec5ab4f44559d234a5b53636d542775b

    SHA256

    c29d65ca28028d2ee5a260cf7156b586f09ec7320c483b2c9c167a53e7f8106a

    SHA512

    485a949c7e3a43bb499bfe5e5be23fb80d9e6ada2537421289e3ebc4bb9ba8c09f82f4df19e38024b9381861dbe245d815971a9b5f1513814b4d62e6ae16caaf

  • memory/2236-18-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/2236-17-0x0000000000610000-0x0000000000616000-memory.dmp

    Filesize

    24KB

  • memory/2236-20-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/2792-0-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/2792-1-0x0000000000420000-0x0000000000426000-memory.dmp

    Filesize

    24KB

  • memory/2792-2-0x0000000000460000-0x0000000000466000-memory.dmp

    Filesize

    24KB

  • memory/2792-3-0x0000000000420000-0x0000000000426000-memory.dmp

    Filesize

    24KB

  • memory/2792-15-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB