Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    29/05/2024, 06:55

General

  • Target

    2024-05-29_d2866f42dca4907929ee5a3b52ce3041_cryptolocker.exe

  • Size

    47KB

  • MD5

    d2866f42dca4907929ee5a3b52ce3041

  • SHA1

    5a0d158ae54ed5845f52a4fc88c39c207f5645e0

  • SHA256

    818b62642d2a06e22065665a62b5209db16e3f3d6ae68f224cdd465ae0510db7

  • SHA512

    d5bfb14737b68bf405855f690ca0e228fe1d451e4847f7050e33178973c21b619d73c9545588248d0aef944a9e7af6a0a9e118a7d56eff47b1e2d8d26b70b297

  • SSDEEP

    768:P6LsoVEeegiZPvEhHSP+gp/QtOOtEvwDpjBBMLZdzuqpXsiE8Wq/Dpkcq:P6Q0ElP6G+gJQMOtEvwDpjB8WMlfq

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 6 IoCs
  • Detection of Cryptolocker Samples 6 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-29_d2866f42dca4907929ee5a3b52ce3041_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-29_d2866f42dca4907929ee5a3b52ce3041_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2116

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          47KB

          MD5

          d1c3a2ffb193a64820c3fbbab9a56aca

          SHA1

          6dbfd8d7d886dfaba2b44eaf478fc4d45566130b

          SHA256

          4a3b4c598314fb56b6dc85b5f8ae92ec45e9021f5b723e0a9bd7a85198965a1c

          SHA512

          0d067e5f5938b7985081ebf9f3125e39f857dd59baf98b4f520a0a874ecef75f0352297fa63c8d8ffc10ad68679266d42eb4e390ca6bf8571b82228644165665

        • memory/2116-17-0x0000000000500000-0x000000000050B000-memory.dmp

          Filesize

          44KB

        • memory/2116-26-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/2116-19-0x0000000000280000-0x0000000000286000-memory.dmp

          Filesize

          24KB

        • memory/2116-27-0x0000000000500000-0x000000000050B000-memory.dmp

          Filesize

          44KB

        • memory/3016-0-0x0000000000500000-0x000000000050B000-memory.dmp

          Filesize

          44KB

        • memory/3016-1-0x0000000000420000-0x0000000000426000-memory.dmp

          Filesize

          24KB

        • memory/3016-9-0x0000000000420000-0x0000000000426000-memory.dmp

          Filesize

          24KB

        • memory/3016-2-0x0000000000460000-0x0000000000466000-memory.dmp

          Filesize

          24KB

        • memory/3016-13-0x0000000000640000-0x000000000064B000-memory.dmp

          Filesize

          44KB

        • memory/3016-16-0x0000000000500000-0x000000000050B000-memory.dmp

          Filesize

          44KB