Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    04/05/2024, 05:37

General

  • Target

    2024-05-04_96a2f45080101e78d33bcd4fcc649269_cryptolocker.exe

  • Size

    52KB

  • MD5

    96a2f45080101e78d33bcd4fcc649269

  • SHA1

    c7ec177fe7bd37067f7a6d0caba4aae3df0cbd7e

  • SHA256

    ce9acb8902d0b124d0c5b7ef1fb31a021ebb87bd624fcd7b0542ac11e42025de

  • SHA512

    d87b85558e9d2bd9f6b3bd4553a92d63e067ec64e797c75b00737e33a423d00a5159887585bff6a70f90f2a5e027d5aa283870de3cb326c55ad962ae61e899de

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/BtOOtEvwDpjBVaD3E09vxmlcaTk:X6QFElP6n+gJBMOtEvwDpjBtExmlY

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-04_96a2f45080101e78d33bcd4fcc649269_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-04_96a2f45080101e78d33bcd4fcc649269_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2520

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          52KB

          MD5

          96a3455716826dab35d70afec97f98fe

          SHA1

          0f6249452211801e7d00f88be5af29535a1b5846

          SHA256

          03b44bef2a57283ebcda20ee3dc27de20929b4eca84cf066e5b7fe0b16b45ac3

          SHA512

          c82cf51d6b479deed2820c8feabf5890e891af4264f989e71fea498f5fdc2785ebf7535cc01261ee9f522b31b1daf8358e804b570a8d031a5275fbfb177054e3

        • memory/2036-0-0x0000000000330000-0x0000000000336000-memory.dmp

          Filesize

          24KB

        • memory/2036-1-0x0000000000470000-0x0000000000476000-memory.dmp

          Filesize

          24KB

        • memory/2036-8-0x0000000000330000-0x0000000000336000-memory.dmp

          Filesize

          24KB

        • memory/2520-15-0x00000000003F0000-0x00000000003F6000-memory.dmp

          Filesize

          24KB

        • memory/2520-22-0x00000000003B0000-0x00000000003B6000-memory.dmp

          Filesize

          24KB