Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22/04/2024, 02:02

General

  • Target

    2024-04-22_6fd588cf9c044c6e976760f5783edac8_cryptolocker.exe

  • Size

    40KB

  • MD5

    6fd588cf9c044c6e976760f5783edac8

  • SHA1

    8b2e252adeff547fb58a9b76cba1fe0259b5f1da

  • SHA256

    c3c04e0696583c27e7fba7f989fa94354cd734af298f486eef7dbf356cb7dda0

  • SHA512

    d88f979701b2c49ca7f8c3b6c2dbb190b6eb7a86262be8dd03af7ec5c715b455a6d029aeddb38e3a635ea445cc0369a631dc5a917589a974f1de08a568d7650d

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBaac4HKcfrYW:X6QFElP6n+gJQMOtEvwDpjBsYK6rN

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-22_6fd588cf9c044c6e976760f5783edac8_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-22_6fd588cf9c044c6e976760f5783edac8_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:3064

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          40KB

          MD5

          e82cb9d3ab7070c40c7a5570b34708e3

          SHA1

          e05cd3562540184186eb3f7a483e688aa4c77d72

          SHA256

          38bd8dd7b6546220f600d9dad0c4b8e210bc8d9f6719fa6dedaf9539579af825

          SHA512

          b137ce71814d1a7b5eb68417137bf0533c262fc5de66ad92903cc090127ede49ff3ff874a59685cfcd3a6c0e4de61051abc4dd486861603c76a2b725395e3695

        • memory/1712-0-0x00000000001D0000-0x00000000001D6000-memory.dmp

          Filesize

          24KB

        • memory/1712-2-0x00000000001D0000-0x00000000001D6000-memory.dmp

          Filesize

          24KB

        • memory/1712-1-0x0000000000280000-0x0000000000286000-memory.dmp

          Filesize

          24KB