Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    14/05/2024, 07:24

General

  • Target

    2024-05-14_0803aec01755680534856ef30e4f0b98_cryptolocker.exe

  • Size

    41KB

  • MD5

    0803aec01755680534856ef30e4f0b98

  • SHA1

    3acbdc3ddb782d951f691106e87cb59bd2755262

  • SHA256

    a241008377500b208ed168350c4dec2bbf3df7ea9794444e0be5317df0bda95d

  • SHA512

    d207aebed6f791952b6c91adf19a35f6e747ae91543ac4b9285a507a8c523360e4d2dc143725327e312429d31aacc897217310c254d2313bba02c36a5fa10b2b

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBaac4HKcfr9Orm:X6QFElP6n+gJQMOtEvwDpjBsYK6r0rm

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-14_0803aec01755680534856ef30e4f0b98_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-14_0803aec01755680534856ef30e4f0b98_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2676
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2972

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          41KB

          MD5

          6c4851dc25334c5a9fa84cda9ebc9c2e

          SHA1

          2aa6937f8c3c4621849ee5f676879e1a8df3414d

          SHA256

          37706eb274c4ea3c51af1c408d865b91c710343d89af6334691ce62025116bcd

          SHA512

          7828be8320192a4e33e494b9e552954651937157370aac3229fda4632d5331548e65882766328c3e058d73ae24b09f3ba1721740242d7872dde5156f67e32020

        • memory/2676-0-0x0000000000440000-0x0000000000446000-memory.dmp

          Filesize

          24KB

        • memory/2676-8-0x0000000000440000-0x0000000000446000-memory.dmp

          Filesize

          24KB

        • memory/2676-1-0x0000000000480000-0x0000000000486000-memory.dmp

          Filesize

          24KB

        • memory/2972-15-0x0000000000470000-0x0000000000476000-memory.dmp

          Filesize

          24KB

        • memory/2972-22-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB