Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26/05/2024, 02:44

General

  • Target

    2024-05-26_d3c8c23fbcd23ffab60d7626032cb1d5_cryptolocker.exe

  • Size

    39KB

  • MD5

    d3c8c23fbcd23ffab60d7626032cb1d5

  • SHA1

    56145ee21c2026c4740f5c81e47d9a1f60b61f04

  • SHA256

    cdbe079eac374d4acb402fe8ca2b3e01b7267ee82ea8c04a86df2c6ec916baa3

  • SHA512

    8f0d4cd15114fece47b7a2d11c71d0d253690e5707cf73c6103aa5032f2a854d93256ca20c3b50c730131ed512c60913c19f307fd39c5316b8eca6b418b2c2ab

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBVaD3TP7DFCw00:X6QFElP6n+gJQMOtEvwDpjBmzDU50

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-26_d3c8c23fbcd23ffab60d7626032cb1d5_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-26_d3c8c23fbcd23ffab60d7626032cb1d5_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2864
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2080

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          40KB

          MD5

          dd39b2b6b3a34174d2530366eaac9f7e

          SHA1

          75d72c98fd3362fb54dbbfdb7b9e9d2f5bb4f4cf

          SHA256

          51e1a07f4009820f88297301a62b8a5af83958493a69774960e2190470149e54

          SHA512

          3dd14ffe1d17967a70bf48be77533c6691911bcfd28b7dba50974e226a7da8dd6a0479dce4311178583a3f23682254f20fe780c4b8302cbb26a189b1918f7f71

        • memory/2080-22-0x0000000000320000-0x0000000000326000-memory.dmp

          Filesize

          24KB

        • memory/2080-15-0x0000000000460000-0x0000000000466000-memory.dmp

          Filesize

          24KB

        • memory/2864-1-0x0000000000370000-0x0000000000376000-memory.dmp

          Filesize

          24KB

        • memory/2864-0-0x00000000002B0000-0x00000000002B6000-memory.dmp

          Filesize

          24KB

        • memory/2864-8-0x00000000002B0000-0x00000000002B6000-memory.dmp

          Filesize

          24KB