Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    20-04-2024 04:44

General

  • Target

    2024-04-20_ac7f9fb476e82a0272c4f41768f8d7f6_cryptolocker.exe

  • Size

    74KB

  • MD5

    ac7f9fb476e82a0272c4f41768f8d7f6

  • SHA1

    f03e5689695f2190c61a501e306d9439f706ff4c

  • SHA256

    062b021e647c46610efc3172452b4006afcf992b131c01aedccd06543845847a

  • SHA512

    849af5a0c6320944c1f17009cdbcb323a85d4167a3660036c30031ee69b364497f5810d49e392c350e3c54c06b851805afb6594a85d83414a8ab4a1ab278c3df

  • SSDEEP

    1536:X6QFElP6n+gJQMOtEvwDpjBZYTjipvF2bx1rHs9:X6a+SOtEvwDpjBZYvQd2O

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-20_ac7f9fb476e82a0272c4f41768f8d7f6_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-20_ac7f9fb476e82a0272c4f41768f8d7f6_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2176

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    74KB

    MD5

    79aa43cb9625e40a4dbb760a8955113c

    SHA1

    63b54d87c60f84cb5ba30b18cb20ec0deed7c37c

    SHA256

    3c421d032990e3e5a3cedbdaace68a773d4373479376d40c550bdc46538016dc

    SHA512

    74304de7f87924107218f826759644c6b59151ad400cd46b967ff39c845c74b691d2deac867b09fe238021dcc7b081f12db9759ed5919ab270fd02f41dcbfd3a

  • memory/1704-0-0x0000000000320000-0x0000000000326000-memory.dmp

    Filesize

    24KB

  • memory/1704-1-0x0000000000460000-0x0000000000466000-memory.dmp

    Filesize

    24KB

  • memory/1704-4-0x0000000000320000-0x0000000000326000-memory.dmp

    Filesize

    24KB

  • memory/2176-15-0x00000000004A0000-0x00000000004A6000-memory.dmp

    Filesize

    24KB

  • memory/2176-20-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB