Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    22/05/2024, 14:51

General

  • Target

    2024-05-22_7d378984d8e379a7ca65462d5afb40dc_cryptolocker.exe

  • Size

    46KB

  • MD5

    7d378984d8e379a7ca65462d5afb40dc

  • SHA1

    efc0a4521e10e1384ad240ac0713adf721db708c

  • SHA256

    eb6f9130e4951a9ff1daa8dceab4a026ed3613317a780748839de5c663d61113

  • SHA512

    8feda65929b7d6258face324d80b3577be253a852ba22c9945af1857e9901e460cd221a6e6646cb059017f58f662191ce85fd07626907c1af47e417302e58ae5

  • SSDEEP

    768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpj/MLam5aFr7YOzzfm0EXsJv:V6QFElP6n+gMQMOtEvwDpjyaYaFAh3m

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-22_7d378984d8e379a7ca65462d5afb40dc_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-22_7d378984d8e379a7ca65462d5afb40dc_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:624
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2820

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          46KB

          MD5

          b31c74cbfcd2b0ef8735893a7b835546

          SHA1

          1468486f7a1411a340bb33d368062a5c05617fda

          SHA256

          000acd3003419aa71f9781623baa17b5e28a5fbff2d98de1c6b1243c96ad080c

          SHA512

          03efb34a111ad87d81f695c172398e7cd7d75fa5072132432fbad4d7fcfd327a382e2438a922acfe8e8592f49e0a275a37128c90993bc2cdb323c822e0b9641b

        • memory/624-0-0x00000000001D0000-0x00000000001D6000-memory.dmp

          Filesize

          24KB

        • memory/624-1-0x0000000000210000-0x0000000000216000-memory.dmp

          Filesize

          24KB

        • memory/624-8-0x00000000001D0000-0x00000000001D6000-memory.dmp

          Filesize

          24KB

        • memory/2820-15-0x00000000002C0000-0x00000000002C6000-memory.dmp

          Filesize

          24KB

        • memory/2820-22-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB