Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10/05/2024, 05:33

General

  • Target

    2024-05-10_aadf20ce2229ee42dda6b1829a396918_cryptolocker.exe

  • Size

    50KB

  • MD5

    aadf20ce2229ee42dda6b1829a396918

  • SHA1

    770e5959c55a6b5d60c1104d971643006141d726

  • SHA256

    638db3fee9f051eb950c7a72638d924fed36b3c4189ff8cdd7e92869ce9739f9

  • SHA512

    ca85cc4014f0e8b943294e98dcb8fc9b46526f70c3bd9972b9bad97d4511a231f462a64c29abe128b741db6131144b792191e443e01844323640bb08c22faa30

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBaaEqbIu55id3AMWZYO:X6QFElP6n+gJQMOtEvwDpjB0GIWiWLiO

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-10_aadf20ce2229ee42dda6b1829a396918_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-10_aadf20ce2229ee42dda6b1829a396918_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2872
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2944

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    50KB

    MD5

    b7a5bf52f5c012569edd27dcd8e01455

    SHA1

    0f5f92e64aa16670b9961f84867fbddd00410447

    SHA256

    8f5812aaf3e3a0b6579d1318b052d41ea44c4bb316b9324253f11650e1d4330d

    SHA512

    db837abbeeea269f8a817314b18ca45a4fa1347bfb37ee5afe0944e32b6a0e90735a49ad5d641d96c424339379cf424fcfc4e52044310e442af593018493b6cf

  • memory/2872-0-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2872-1-0x0000000000300000-0x0000000000306000-memory.dmp

    Filesize

    24KB

  • memory/2872-8-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2944-15-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB