Analysis

  • max time kernel
    148s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    17/05/2024, 10:24

General

  • Target

    2024-05-17_05b42cb6a14bfb1b88f57d19d8d578e5_cryptolocker.exe

  • Size

    41KB

  • MD5

    05b42cb6a14bfb1b88f57d19d8d578e5

  • SHA1

    444415cea3ce035a047b5d0573d274a737fdd02f

  • SHA256

    df5a9cfd8ad83c30c2dea350e5de15c1263587665b2c1b335f3f4005b385dc22

  • SHA512

    ac5f1ed371dce824c2c5d07d73ebff061699b072f48239f9ab2241f5c8f3bd14e847c49a3fee0d0242684ebc615c724025e32b39821f912fc4fd04b55c686ab6

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBaac4HKcfr9Ori:X6QFElP6n+gJQMOtEvwDpjBsYK6r0ri

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-17_05b42cb6a14bfb1b88f57d19d8d578e5_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-17_05b42cb6a14bfb1b88f57d19d8d578e5_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2616
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2648

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          42KB

          MD5

          d3fd4cf87ddaa0bbd77af5fc079d4a4c

          SHA1

          abb67c3a7744dc7a853f43070b01d59c9db2cd3f

          SHA256

          fe06fca30d6f167a551b55e5e675551066a3320a588ff8785963abf865cfe2c9

          SHA512

          fbbe51f31a2dc26c01ed56a555670d3d7553d2da186941394df9e1f9e4e250394603bf6a52430aabc94ef202c224ed3e7851ce0d5b91455e6fbba6b2e36cff39

        • memory/2616-0-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/2616-1-0x0000000000490000-0x0000000000496000-memory.dmp

          Filesize

          24KB

        • memory/2616-8-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/2648-22-0x00000000001D0000-0x00000000001D6000-memory.dmp

          Filesize

          24KB

        • memory/2648-15-0x0000000000290000-0x0000000000296000-memory.dmp

          Filesize

          24KB