Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    30/04/2024, 00:57

General

  • Target

    2024-04-30_a7c7c02b4f061a7227f1a0cac4af5857_cryptolocker.exe

  • Size

    64KB

  • MD5

    a7c7c02b4f061a7227f1a0cac4af5857

  • SHA1

    0eed8d911b53a9d52c9f4a3ee5a0b653bf6cae68

  • SHA256

    dfa286ee02d6996a88efb55992d3fb3dab00b8c17f1eaf3d1491be81899c603c

  • SHA512

    de2a176d6d09d51dcd0677878ced37e0356cdad0d34f6cb6e00e51c44d8979256875ae86c442b34ded8e7de2884780f4bd4056ca15ea45234e149305b3120779

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjyaLccVCbmh85Y:V6a+pOtEvwDpjv3

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-30_a7c7c02b4f061a7227f1a0cac4af5857_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-30_a7c7c02b4f061a7227f1a0cac4af5857_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2888
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2824

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          65KB

          MD5

          600351c096d2e1541e7ed9e52e6eb0a7

          SHA1

          9e07511800a2ae1f579710ac50f77644ca3dc364

          SHA256

          1de3a72e5338a14adcb242d6212f857456b89f58fc5376acc1cf5bddfac006d0

          SHA512

          125e3b01c2a6b7e697af56a39c6884c6d843f07d2c4f2911e3fe729bd92fdc96f441f91269043e2e9dc9502704cca47a75db6c1294769cd90cf5a70169b32126

        • memory/2824-15-0x0000000000370000-0x0000000000376000-memory.dmp

          Filesize

          24KB

        • memory/2824-22-0x0000000000330000-0x0000000000336000-memory.dmp

          Filesize

          24KB

        • memory/2888-0-0x00000000001D0000-0x00000000001D6000-memory.dmp

          Filesize

          24KB

        • memory/2888-1-0x00000000001D0000-0x00000000001D6000-memory.dmp

          Filesize

          24KB

        • memory/2888-2-0x0000000000290000-0x0000000000296000-memory.dmp

          Filesize

          24KB