Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    29/04/2024, 02:36

General

  • Target

    2024-04-29_8153745bac2814b273a0bdeb5ba1e514_cryptolocker.exe

  • Size

    42KB

  • MD5

    8153745bac2814b273a0bdeb5ba1e514

  • SHA1

    b702785ab0cf0627c4e7bc0da1010c2988699cf1

  • SHA256

    65cfb1d077991f89ccf30d61f5f5330d37f8edc40a56e5df628a31bde454576c

  • SHA512

    dfe24ce10849804390ad17386286b39221e74ea436437e1526ec5d2470761639445907126b752682af91dafd00b2c512b96922f771d3cae8052a4a0804e78bc2

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBVaD3TP7DFHuRcD9f:X6QFElP6n+gJQMOtEvwDpjBmzDkWDF

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-29_8153745bac2814b273a0bdeb5ba1e514_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-29_8153745bac2814b273a0bdeb5ba1e514_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1636
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    43KB

    MD5

    43eab3a35516f8a23e3e2b30e96c3e93

    SHA1

    878edd99777f2c28cc8c8bdc3354708362132c83

    SHA256

    d66bea9eb82a0514b91b45ca2a9162271391de252bac304505e597f30340545a

    SHA512

    2731050100e07f9e9d9124867b74538f5113cde0a39e8b83727bfe04940e1ed81ef6433a0b95f9bdef7d92ca00910ddabf313a961bb1ae8e7d8f5acacebf1c38

  • memory/1636-0-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/1636-7-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/1636-1-0x0000000000380000-0x0000000000386000-memory.dmp

    Filesize

    24KB

  • memory/2036-15-0x00000000001E0000-0x00000000001E6000-memory.dmp

    Filesize

    24KB

  • memory/2036-16-0x00000000002A0000-0x00000000002A6000-memory.dmp

    Filesize

    24KB