Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    20-04-2024 16:59

General

  • Target

    2024-04-20_cb2a37058d948893c7bbe4a359e63235_cryptolocker.exe

  • Size

    40KB

  • MD5

    cb2a37058d948893c7bbe4a359e63235

  • SHA1

    4d99f6159931ca352cc2945604f1d47518079608

  • SHA256

    233d172c06b550ec6db7ecb26cf0ba473775a35a4e6d1b673e5c12eb447fb9c6

  • SHA512

    a920334c270eb3994ce14815fb14479981a96b106255f11fa6faccc3e7d607816c4d0aac8edecfc303db9c113a7e940c65aaf424465c18d569d73995074d72fb

  • SSDEEP

    768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpj/MLam5axRVZP:V6QFElP6n+gMQMOtEvwDpjyaYaLP

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-20_cb2a37058d948893c7bbe4a359e63235_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-20_cb2a37058d948893c7bbe4a359e63235_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2108
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2456

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    40KB

    MD5

    1ee96bfe6dbd1dbc3bed15bcdf51b36e

    SHA1

    72a8ffcd31e6ce1d9a11d47e3c299d2ddd6e577a

    SHA256

    e9d1bdcacd8105ac74938ae02609efa0ead54822572f390e995ee83e0820caa6

    SHA512

    86a6e4a1dd1ac506c8a71ec1c3be0ba3b0a5ca345b0013ce6d5e76ee7fee8ce1cb00ec2c9063839daa989c55c4794ad0f6312b9e9d56acd1fd9904c82a9cd8ed

  • memory/2108-0-0x00000000002B0000-0x00000000002B6000-memory.dmp

    Filesize

    24KB

  • memory/2108-1-0x0000000000300000-0x0000000000306000-memory.dmp

    Filesize

    24KB

  • memory/2108-2-0x00000000002B0000-0x00000000002B6000-memory.dmp

    Filesize

    24KB

  • memory/2456-15-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB