Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    29/04/2024, 03:30

General

  • Target

    2024-04-29_36b9a181c98e6ffcfb5e457c6db6d8b7_cryptolocker.exe

  • Size

    84KB

  • MD5

    36b9a181c98e6ffcfb5e457c6db6d8b7

  • SHA1

    dda3045bde468e0312016a7c30ec17f1d682fd2a

  • SHA256

    b62d9eed37fe9d7a32733493a2bc1c0039a66c0010a95c9cb5ec1c0d637dc27f

  • SHA512

    05d3368950f9201e97b4f5a4fa812a3ef2d9629e27a6138b8df75a180ebaa1e3b72218de3a5dd2b16ee28029d51daa31cc4ca005601e5d42fffca8621cbe889e

  • SSDEEP

    768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpj/MLa5VccPtNw5CS95yFPnjX:V6QFElP6n+gMQMOtEvwDpjyaLccVNld

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-29_36b9a181c98e6ffcfb5e457c6db6d8b7_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-29_36b9a181c98e6ffcfb5e457c6db6d8b7_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1640
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2120

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    85KB

    MD5

    3755522afbf3e74d05da4ad38b8dca12

    SHA1

    464149d8267dc4eac9a34462141c8e5e341a4196

    SHA256

    0b5074db853d734dcab8ac1c346c9ae533daea71ebdd2a96a786aea68f488813

    SHA512

    0af35f9cb871933f0041ab407aaed719df1a0cbf63c450f234a1b666ad974119a1106da6458b7c3c9990d466e8818338a0d42ef4e8cd27d2d416fd95e153c2e4

  • memory/1640-0-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/1640-1-0x0000000000470000-0x0000000000476000-memory.dmp

    Filesize

    24KB

  • memory/1640-8-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/2120-15-0x0000000000340000-0x0000000000346000-memory.dmp

    Filesize

    24KB

  • memory/2120-22-0x0000000000300000-0x0000000000306000-memory.dmp

    Filesize

    24KB