Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    07-05-2024 03:43

General

  • Target

    2024-05-07_a4044ae4ddb189826b0a08051ccac8fa_cryptolocker.exe

  • Size

    46KB

  • MD5

    a4044ae4ddb189826b0a08051ccac8fa

  • SHA1

    521aeec0da6f1f000a31d4794eb88a522653e3f0

  • SHA256

    cb13d09acf156b10110615a604a6e6e3f54b9e3229ec26e93c1dd3ad4f3cd652

  • SHA512

    05fb197d430d10f5b7d01336a43a7befc5fd2f90b7c5ceb6003626c029a544dc4c69032952226f3dac7702fc196fe9b70f8d87d48fce9b1c26c7e6fb856e5523

  • SSDEEP

    768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpj/MLam5aFr7YOzzfm0EXsBS:V6QFElP6n+gMQMOtEvwDpjyaYaFAh3WS

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-07_a4044ae4ddb189826b0a08051ccac8fa_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-07_a4044ae4ddb189826b0a08051ccac8fa_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2064
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:1976

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    46KB

    MD5

    3fa116979b643f3140acd0d3a37c243c

    SHA1

    21284da7467608302eb9da1ac9ff2a8e66f91886

    SHA256

    94834c0a9944f2bfe0c649398dd62f99e6bc32592456ad039761beac1b8a71b8

    SHA512

    ed71b8040fd75f4b3bba88f7c8f3d234161d8dd4e09793fced881cd9b49bd954ce3f5127ad739b9b3569a5a95e335168acbdb0e219d3481f62c853630c70afc2

  • memory/1976-15-0x0000000000470000-0x0000000000476000-memory.dmp

    Filesize

    24KB

  • memory/1976-22-0x0000000000420000-0x0000000000426000-memory.dmp

    Filesize

    24KB

  • memory/2064-1-0x00000000004B0000-0x00000000004B6000-memory.dmp

    Filesize

    24KB

  • memory/2064-8-0x0000000000460000-0x0000000000466000-memory.dmp

    Filesize

    24KB

  • memory/2064-0-0x0000000000460000-0x0000000000466000-memory.dmp

    Filesize

    24KB