Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09/05/2024, 15:40

General

  • Target

    2024-05-09_aacc235775a8d14f4a69686c373df390_cryptolocker.exe

  • Size

    95KB

  • MD5

    aacc235775a8d14f4a69686c373df390

  • SHA1

    e600da3afbc28b6be284cb5b86696132a6a81083

  • SHA256

    05c7c417accb4ff33049ac9f1b6fa789f9967a616f57b1bc4fbe46ab9790060f

  • SHA512

    7079b3af770ae11d19240ae0b2f484de63a73dcbc595a96f29d8b712a84243d30b92628f01c548dd8521055de519888a2beb0a129a3475e5ee6af7b93f33af4c

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpYIM:AnBdOOtEvwDpj6zf

Score
9/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 4 IoCs
  • UPX dump on OEP (original entry point) 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-09_aacc235775a8d14f4a69686c373df390_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-09_aacc235775a8d14f4a69686c373df390_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2184
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2256

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    96KB

    MD5

    4ed31a83e79f19f49be532d90d5b0247

    SHA1

    f874321ad79b6f72e7cbde8a1b36090aef8b4db7

    SHA256

    c0cc449e7014494dee37299756f8470d224a338cb4604d53cf1d2205046c9f0e

    SHA512

    b3d6c76ad60d198c3b1b7d41802b66a0b8158431bdefa19edc6f5fbc7c948a3b3c0c3502e915d91d8b18898d232c93e79b6f4ca5112c7195d3139bab65df10b0

  • memory/2184-0-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/2184-9-0x0000000000330000-0x0000000000336000-memory.dmp

    Filesize

    24KB

  • memory/2184-2-0x0000000000370000-0x0000000000376000-memory.dmp

    Filesize

    24KB

  • memory/2184-1-0x0000000000330000-0x0000000000336000-memory.dmp

    Filesize

    24KB

  • memory/2184-16-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/2256-18-0x0000000000490000-0x0000000000496000-memory.dmp

    Filesize

    24KB

  • memory/2256-25-0x0000000000450000-0x0000000000456000-memory.dmp

    Filesize

    24KB

  • memory/2256-26-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB