Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10/05/2024, 00:35

General

  • Target

    2024-05-10_48f613a631ffc0f71faa44f890276318_cryptolocker.exe

  • Size

    45KB

  • MD5

    48f613a631ffc0f71faa44f890276318

  • SHA1

    9607c6dd24dc87e22fd86b530027fedd8aeae05e

  • SHA256

    2e452dcf0146439850e46f87a84df931fccde460c0b81b3aaa78362dfed54581

  • SHA512

    b6e9a66a5a02a20a4a245691fc26ce2b8a3c246982c457a0b8de7e894923c03ff55b676ebb911e28e2e2942614527879d42df5995b790db4f0d6b14de75770a3

  • SSDEEP

    768:P6LsoEEeegiZPvEhHS5+Mh/QtOOtEvwDpjBpaD3TUogs/VXpAPa:P6QFElP6k+MRQMOtEvwDpjBQpVXf

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Detection of Cryptolocker Samples 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-10_48f613a631ffc0f71faa44f890276318_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-10_48f613a631ffc0f71faa44f890276318_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1152
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:1680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    46KB

    MD5

    8f0f82f0756b0019394b75d98b37a96c

    SHA1

    8b84233199b1f652e4e4ea544e9998ca419f4495

    SHA256

    b09339b70ecdc7274b8bef113052f38257d0c6ddca2d08af672fdb5f054cb60a

    SHA512

    66757a8460d0c201018a561d727831acbd81f78ce62c382dede3a6ea818dac95b29332196232264d8cccb432ca03d6cdc3d9dca4362f60376dc790296d57b91a

  • memory/1152-0-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/1152-1-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/1152-9-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/1152-2-0x0000000000270000-0x0000000000276000-memory.dmp

    Filesize

    24KB

  • memory/1152-14-0x0000000001D80000-0x0000000001D8B000-memory.dmp

    Filesize

    44KB

  • memory/1152-16-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/1680-18-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/1680-19-0x00000000002D0000-0x00000000002D6000-memory.dmp

    Filesize

    24KB

  • memory/1680-20-0x0000000000300000-0x0000000000306000-memory.dmp

    Filesize

    24KB

  • memory/1680-27-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB