Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 15:02

General

  • Target

    2024-05-22_c065b744c5ea8ffefa42754a557fc6a3_cryptolocker.exe

  • Size

    47KB

  • MD5

    c065b744c5ea8ffefa42754a557fc6a3

  • SHA1

    23aa915e10602ede33d6257f410f05518483b701

  • SHA256

    c422df7827eea72daadbfa19d03bc44b5a6453f22a51543412a838febe3cecf5

  • SHA512

    f9c614192e23ce8567ef8f68bb2d89a58a2bb7ca46311074a8782d2a4be0ec3152a8edccf78fb25b94e6ee042a88fe04cd2c01706cd2c105dcf51e25ab66b5a1

  • SSDEEP

    384:e/4wODQkzonAYsju5N/surDQtOOtEvwDpjqIGROqS/WccJVJwi2B5oCCM8CLW2VR:79inqyNR/QtOOtEvwDpjBKccJVODvy3w

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-22_c065b744c5ea8ffefa42754a557fc6a3_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-22_c065b744c5ea8ffefa42754a557fc6a3_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2612

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    47KB

    MD5

    5f0b2419564ef57a5409803032e5130a

    SHA1

    677a9d18a99825818a5f07212ac010ca003d02e9

    SHA256

    410a08d34e53bebf5f02f3eddc4a50bcf9ff4d38107d286101b1df8db0a20ef6

    SHA512

    98f6e8e624f585bdef90c918d6dab4b8a398e2461dc267c902e176bd8bd2f942b08bade43361b8b82382a1c01c14e7dd6a5d0bc5011fc2e4ffd20fe43f2e4002

  • memory/2180-0-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/2180-1-0x0000000000420000-0x0000000000426000-memory.dmp

    Filesize

    24KB

  • memory/2180-2-0x0000000000460000-0x0000000000466000-memory.dmp

    Filesize

    24KB

  • memory/2180-9-0x0000000000420000-0x0000000000426000-memory.dmp

    Filesize

    24KB

  • memory/2180-14-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/2612-16-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/2612-18-0x0000000000470000-0x0000000000476000-memory.dmp

    Filesize

    24KB