Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    16/05/2024, 21:36

General

  • Target

    2024-05-16_fd67a9074f317fe929ea6673d13c615d_cryptolocker.exe

  • Size

    46KB

  • MD5

    fd67a9074f317fe929ea6673d13c615d

  • SHA1

    a4102441de2c7b997caf98b8fe35c6a2ee443e54

  • SHA256

    18249e04fb7b0647513391e2ff36dcc5c38cb4994d3948060853432013d1b81a

  • SHA512

    9a1f91f5dee477f0ccbf4461bf041222ad406fcd380e789a08ec038ea4ac75a69e58f366e4c3d502f13044e6b7b15c60cca5e9e8bd2e5d20f215851cfc77395e

  • SSDEEP

    768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpj/MLam5aFr7YOzzfm0EXsU0:V6QFElP6n+gMQMOtEvwDpjyaYaFAh3F0

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-16_fd67a9074f317fe929ea6673d13c615d_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-16_fd67a9074f317fe929ea6673d13c615d_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1756
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:3068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    46KB

    MD5

    ee64f03381f2747008fad396113d782e

    SHA1

    ee6b81aa51a583424bfa7a943b24538543294f6a

    SHA256

    a87a69f407e26e33c395ddf1291ae6a586386b3b519c836e019d7c0fb2a1184a

    SHA512

    d98e8ab276b113f081b145aad938eefe4d0d2673cdb9f8b2a0e29cfeeb389bf1a05e38339f637f6494d8944b3afceff8d1f5e3ebfab7e0218f2c69b7dd28dffd

  • memory/1756-0-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/1756-1-0x0000000000340000-0x0000000000346000-memory.dmp

    Filesize

    24KB

  • memory/1756-8-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/3068-15-0x0000000000380000-0x0000000000386000-memory.dmp

    Filesize

    24KB