Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    01/05/2024, 19:32

General

  • Target

    2024-05-01_c74be0f51e1af025e405d76fb859b085_cryptolocker.exe

  • Size

    38KB

  • MD5

    c74be0f51e1af025e405d76fb859b085

  • SHA1

    e898f24c3bbfd3a5a9e4fe6e5be34daf1d21440d

  • SHA256

    2a07829fe63d91f75482a33573310441e77f04ce37479d718dab1bdd8878322e

  • SHA512

    f4e6b510e7aecd98fdd2cd292a4e5cbc7672a9cc363b503764d04c841af8354b74590851b27e08b7b8d0eeb0af2d7ce3ab280dbd16f289cf5ec75dc7731efd9a

  • SSDEEP

    768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpj/MLam5axO7:V6QFElP6n+gMQMOtEvwDpjyaYao

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-01_c74be0f51e1af025e405d76fb859b085_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-01_c74be0f51e1af025e405d76fb859b085_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1808
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2924

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          38KB

          MD5

          559f5342b8f64da90276b8a251485f41

          SHA1

          7c8ae7fd552d94024dcfc4eeac88b29fffb520f0

          SHA256

          c2c3d74d6cd0118fdf1cd0f496a57e35858be58499b92f250128a511804f19de

          SHA512

          2f606c348b005e36b3bbb7b8a884f1fe087cda6b27d59a16693858287bc976ef7d37318d3c5ef155e3576776b1cfe1ef72f83ee917fe1533ba087aaae081bf08

        • memory/1808-0-0x00000000002C0000-0x00000000002C6000-memory.dmp

          Filesize

          24KB

        • memory/1808-1-0x00000000002C0000-0x00000000002C6000-memory.dmp

          Filesize

          24KB

        • memory/1808-2-0x0000000000310000-0x0000000000316000-memory.dmp

          Filesize

          24KB

        • memory/2924-15-0x0000000000280000-0x0000000000286000-memory.dmp

          Filesize

          24KB

        • memory/2924-22-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB