Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29-05-2024 00:45

General

  • Target

    2024-05-29_3ea2ae1a44fe8265a4d30a61b8740ef2_cryptolocker.exe

  • Size

    47KB

  • MD5

    3ea2ae1a44fe8265a4d30a61b8740ef2

  • SHA1

    d846b1bfdee274a46ca735430557feba8ff34270

  • SHA256

    41b094d9133bbccc221dc2701539b2379391050bb37cff498b543dd0dfd766e9

  • SHA512

    8cf8ce9ecb98093c3c74bf4c91e70dd5d33c1162d89e231d5a8cb45be9eda632a6e08c1bce843ef66f806759256e8e6d1c711160431d6066e0ff139744fced9d

  • SSDEEP

    768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpj/MLam5aFr7YOzzfm0EXsBwWZ:V6QFElP6n+gMQMOtEvwDpjyaYaFAh3WN

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-29_3ea2ae1a44fe8265a4d30a61b8740ef2_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-29_3ea2ae1a44fe8265a4d30a61b8740ef2_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:856
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2796

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    47KB

    MD5

    11d39ca38d5971e023a7ae57108a2755

    SHA1

    306f5c7b20d6db294e3b2684870b91eb5fa2232e

    SHA256

    886f0ae56629c56af74f176c166c2bef9d60d12a9facedd81bb6e40428cf2c91

    SHA512

    fbe4c0e09f5fbf63355ab102211202c07a3c360d31e19515062cf29ec5ac4de4504c771c69d2b7ecf1ee65e36d44c274fda3c7ba6bdd1a618ea21b598cfd14b2

  • memory/856-0-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/856-1-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/856-2-0x0000000000530000-0x0000000000536000-memory.dmp

    Filesize

    24KB

  • memory/2796-15-0x0000000000310000-0x0000000000316000-memory.dmp

    Filesize

    24KB

  • memory/2796-22-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB