Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    28-05-2024 06:58

General

  • Target

    2024-05-28_e91ac2f686098e762d5a26c7cdabc5ef_cryptolocker.exe

  • Size

    54KB

  • MD5

    e91ac2f686098e762d5a26c7cdabc5ef

  • SHA1

    a81da7f1d5c6866c780b447c028f913624187711

  • SHA256

    799a265a1d5a18759144cc95f539daf1106593ca8341e5a5497c19c29a52ca49

  • SHA512

    9aa365303f91ac40aa4fb9c04aebcdabbd84fe153662b9e62937c23531003f0645d26ba03614f2411b5b642f36460545bb05a1620e85885ef5875a84314f18c2

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/BtOOtEvwDpjBVaD3E09vxmlcaTIE:X6QFElP6n+gJBMOtEvwDpjBtExml/

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-28_e91ac2f686098e762d5a26c7cdabc5ef_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-28_e91ac2f686098e762d5a26c7cdabc5ef_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2416
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:1400

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    54KB

    MD5

    94dcb8bc4f81d0e27268c6365bc5489e

    SHA1

    7e4f04e070c1f72d72d4953ded3dccdecd6931e2

    SHA256

    3b34a9a54f8b5e27079cf2172fa33a449bc002aac9876ba349df1c5bcb594657

    SHA512

    790a0acdd78a087b1610d9dcea66a72fe83628ebdb079540d805568ed63d43f2c3b1d9c75b4695228ba443d056f36943c6f59885302aae2bf73ecda721d1badf

  • memory/1400-22-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/1400-15-0x0000000000300000-0x0000000000306000-memory.dmp

    Filesize

    24KB

  • memory/2416-0-0x00000000003C0000-0x00000000003C6000-memory.dmp

    Filesize

    24KB

  • memory/2416-1-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/2416-8-0x00000000003C0000-0x00000000003C6000-memory.dmp

    Filesize

    24KB