Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 02:43

General

  • Target

    2024-05-22_9bd8b93d7d94ba82aff73e832391c2e9_cryptolocker.exe

  • Size

    46KB

  • MD5

    9bd8b93d7d94ba82aff73e832391c2e9

  • SHA1

    e3d5e4367871b57c27379eca52b0dde60182481e

  • SHA256

    51f4065ce69dcf3b56551b5a2180e1d86b0926b8e299b64666c61f5a5ac1b262

  • SHA512

    e2b7ccf5ed45818476cf65447a7ebdd87325a3b414e344bb8e40339612260e5178d48f5b282a9739787226fbb29842e9771e31b7ddf7a22a37aeba4550792024

  • SSDEEP

    768:P6LsoEEeegiZPvEhHS5+Mh/QtOOtEvwDpjBpaD3TUogs/VXpAPow:P6QFElP6k+MRQMOtEvwDpjBQpVXzw

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Detection of Cryptolocker Samples 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-22_9bd8b93d7d94ba82aff73e832391c2e9_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-22_9bd8b93d7d94ba82aff73e832391c2e9_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2976
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2900

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe
    Filesize

    46KB

    MD5

    1db0bcab1aab15ca25ade2a6dbf4fa55

    SHA1

    6915c13a0fa7e89fc222404f12f6797c5d28cb21

    SHA256

    715a2d7e1240a94d20e91263ea42fdae0cfb7750d0ed20bd57fc4d1e79c68789

    SHA512

    9cd9c0c63e964a3e4011d0b0d5880691c61996af79cda681ecc2dda87fb316cc89cae89b76981ed81313e41a1c3d74fbeff5d27f0792b79a8ff1eb62b0c55136

  • memory/2900-18-0x0000000000290000-0x0000000000296000-memory.dmp
    Filesize

    24KB

  • memory/2900-25-0x0000000000500000-0x000000000050B000-memory.dmp
    Filesize

    44KB

  • memory/2976-0-0x0000000000500000-0x000000000050B000-memory.dmp
    Filesize

    44KB

  • memory/2976-2-0x0000000000390000-0x0000000000396000-memory.dmp
    Filesize

    24KB

  • memory/2976-9-0x0000000000240000-0x0000000000246000-memory.dmp
    Filesize

    24KB

  • memory/2976-1-0x0000000000240000-0x0000000000246000-memory.dmp
    Filesize

    24KB

  • memory/2976-13-0x0000000002BC0000-0x0000000002BCB000-memory.dmp
    Filesize

    44KB

  • memory/2976-16-0x0000000000500000-0x000000000050B000-memory.dmp
    Filesize

    44KB