Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    02-05-2024 03:44

General

  • Target

    2024-05-02_b6ad49e2c1c1cb80ed72905cb3a74381_cryptolocker.exe

  • Size

    52KB

  • MD5

    b6ad49e2c1c1cb80ed72905cb3a74381

  • SHA1

    3796e6a49b8a770f154714f0ca4a061933b481ad

  • SHA256

    f5ea53e4154e0c715d90307c4b320d6f06d97da2d491fc53d57d7c1b706b509f

  • SHA512

    f8db3d70c018130e9df90ae3d43958536f1323a3394b7fdb23ffab5a029943023d7cea51a02f8585386696611f98d276fc5d33de325985d830a2db5808ec8000

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjyaLccCGXliH:V6a+pOtEvwDpjvDG

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-02_b6ad49e2c1c1cb80ed72905cb3a74381_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-02_b6ad49e2c1c1cb80ed72905cb3a74381_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2360
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:3012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    52KB

    MD5

    0a03bf31fb9b8cf2a61750fc1b0dff5f

    SHA1

    df884fbab7f50c31e962fe7a413145be4569de4b

    SHA256

    3bdbf5ff1d39c207e4391ce8585d677ebc5907d2a93691e5ad3e22de47086ad5

    SHA512

    372404703b52055711c79b45a7a4a724baf18da51db320c54692ca888e3a448cf5574ba4f6728cc45aac5deb23363825b3661ddaae724956c6d5c4a8e163c52f

  • memory/2360-8-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2360-1-0x0000000000380000-0x0000000000386000-memory.dmp

    Filesize

    24KB

  • memory/2360-0-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB