Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    23/05/2024, 19:41

General

  • Target

    2024-05-23_d9c3764ed2fbcc9035364392cb8274df_cryptolocker.exe

  • Size

    73KB

  • MD5

    d9c3764ed2fbcc9035364392cb8274df

  • SHA1

    226f13668115eb57f8eaafdb3d65171515668b46

  • SHA256

    1eecb5fab3eeef3a9b2504d4db9dbc9783dd5abe353596d942a1b8fc57a08865

  • SHA512

    26c6b716c59fc1c2d79302d32fb28e752bec3f629511a09deb148cfa99473675587a2cb02558fa074fa43f2ff7327689a3baf4ff0b3b0abc80e6b69aa4759dfe

  • SSDEEP

    768:u6LsoEEeegiZPvEhHSG+gZgtOOtEvwDpjeY10Y/YMs8:u6QFElP6n+gWMOtEvwDpjJGYQb8

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-23_d9c3764ed2fbcc9035364392cb8274df_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-23_d9c3764ed2fbcc9035364392cb8274df_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2116
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:3044

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          74KB

          MD5

          fe92ff6bc1fa92a62449fb11bbdb7368

          SHA1

          120ff8c8573dcf839bf0100fbc2f181e2a4efacb

          SHA256

          312ffc9e05870fe8b99561106522053449d7513441f36c1d71ec938d8eb30a9a

          SHA512

          0c86555f221f174913a0ee3776c4c0c28fce2c79492cffacb44b9dd620fa15fbf7c2877e76841c04129c8a28cc4489eb5c5dc56c034980e8f0c6e9083dfa159c

        • memory/2116-0-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/2116-1-0x0000000000290000-0x0000000000296000-memory.dmp

          Filesize

          24KB

        • memory/2116-8-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/3044-22-0x00000000002D0000-0x00000000002D6000-memory.dmp

          Filesize

          24KB

        • memory/3044-15-0x0000000000470000-0x0000000000476000-memory.dmp

          Filesize

          24KB