Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27/04/2024, 18:25

General

  • Target

    2024-04-27_0c25490833b52e6202f147da7d22b2f7_cryptolocker.exe

  • Size

    31KB

  • MD5

    0c25490833b52e6202f147da7d22b2f7

  • SHA1

    508e612d720c053025aa7bb079dfdb124b2fa278

  • SHA256

    0854a06f4b1271cfc12b311901d986fd8e3c263f54e08b1453554070add1895e

  • SHA512

    951df33ecf3b0ce53c320819f931f6de56810cbf0c8715758fd2708fc16b8a59b7afe42cbcbc2e1e760e78cd2223b169ce4017006a5411ecbe4f328c9fab4a35

  • SSDEEP

    768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIOc+4tHurJm:q0zizzOSxMOtEvwDpj/arqd

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-27_0c25490833b52e6202f147da7d22b2f7_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-27_0c25490833b52e6202f147da7d22b2f7_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:112
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:1580

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          31KB

          MD5

          7f2b549d8af6e5e787c672f3c8b440f6

          SHA1

          e0ece47e7605ede9b5f4fd9eef5dfb180c8cef9f

          SHA256

          4f06735706445605ad791598253a0cb2e14c477c0246531b7e16a6140a00c378

          SHA512

          a8bdcb90cde6a3f92373f3d12f4fa3ad574f40cf4778b2b9f99b2dff5fb16ed386c4a01e5d8e695c66e933c5023123bec776ae8da5ec4d3fcb9501da8ef81206

        • memory/112-0-0x0000000000500000-0x0000000000510000-memory.dmp

          Filesize

          64KB

        • memory/112-1-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/112-2-0x0000000000290000-0x0000000000296000-memory.dmp

          Filesize

          24KB

        • memory/112-9-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/112-16-0x0000000000500000-0x0000000000510000-memory.dmp

          Filesize

          64KB

        • memory/1580-18-0x0000000000280000-0x0000000000286000-memory.dmp

          Filesize

          24KB

        • memory/1580-25-0x0000000000500000-0x0000000000510000-memory.dmp

          Filesize

          64KB