Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 21:51

General

  • Target

    2024-05-22_94c362d801691e3973aeb8e7ad025d15_cryptolocker.exe

  • Size

    39KB

  • MD5

    94c362d801691e3973aeb8e7ad025d15

  • SHA1

    dbc15913b48cc2e059c914d7325a3f6de5a56825

  • SHA256

    f066eb36d005e4511cf18ddf4a0a7a4d952a58f7e7a196d499827c5fd10b1051

  • SHA512

    fed2a7376aa23a4a817ed9c5708a42b392766393bf905db93396e1919ab614f59ac394b4f5ed26a3245fa327924fe6e3c8aa070352833920605302d998b47dee

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaBsw:qDdFJy3QMOtEvwDpjjWMl7TdX

Score
9/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 4 IoCs
  • UPX dump on OEP (original entry point) 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-22_94c362d801691e3973aeb8e7ad025d15_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-22_94c362d801691e3973aeb8e7ad025d15_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2108
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2480

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe
    Filesize

    39KB

    MD5

    4e44e10c1f2abf852f5b10dbade3750d

    SHA1

    0b8144c393a719d20e8118d0fdac4d077f5a4425

    SHA256

    04234a4123c2cea5d305fb734fece979220718daa12ad95ee46fd57065674da3

    SHA512

    60deaa464bd1c557ca0522496e75c5f312b05945b8c5337871b8018597969b75658e4fee85c0cbe6f9ba4e03193999c761a249b613151d2f56d03c59cc18a668

  • memory/2108-0-0x0000000000500000-0x0000000000510000-memory.dmp
    Filesize

    64KB

  • memory/2108-9-0x0000000000240000-0x0000000000246000-memory.dmp
    Filesize

    24KB

  • memory/2108-2-0x0000000000300000-0x0000000000306000-memory.dmp
    Filesize

    24KB

  • memory/2108-1-0x0000000000240000-0x0000000000246000-memory.dmp
    Filesize

    24KB

  • memory/2108-16-0x0000000000500000-0x0000000000510000-memory.dmp
    Filesize

    64KB

  • memory/2480-25-0x00000000002C0000-0x00000000002C6000-memory.dmp
    Filesize

    24KB

  • memory/2480-18-0x00000000004C0000-0x00000000004C6000-memory.dmp
    Filesize

    24KB

  • memory/2480-26-0x0000000000500000-0x0000000000510000-memory.dmp
    Filesize

    64KB