Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    31/05/2024, 00:42

General

  • Target

    2024-05-31_ff52909f2c92cd67ee8fe4d99564641f_cryptolocker.exe

  • Size

    48KB

  • MD5

    ff52909f2c92cd67ee8fe4d99564641f

  • SHA1

    354b0edb671a42d2dc09efeea673d4dfe1dc1b00

  • SHA256

    906e3fa315ea783c1282a58fd2ad6b1a3dfe0a8a5a940148c19e58eccdbe883b

  • SHA512

    29a32b15044f52764427d34c4d35d923ec8d7c3fc5b1cea1385e49650cf69e523c7e54b1e2aa63d3a9e405349cb5fd6acb1b543ad57b941db36e6d608caa750b

  • SSDEEP

    768:P6LsoVEeegiZPvEhHSP+gp/QtOOtEvwDpjBBMLZdzuqpXsiE8Wq/Dpkc3:P6Q0ElP6G+gJQMOtEvwDpjB8WMlf3

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-31_ff52909f2c92cd67ee8fe4d99564641f_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-31_ff52909f2c92cd67ee8fe4d99564641f_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1956
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2968

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          48KB

          MD5

          836c661012fdaa2ccbf22a5b2700f0a1

          SHA1

          5cf1d27075c7b02249591efd3f4536b2abb33800

          SHA256

          72a66857116f9b7f867fd4c1b26eb1dae01d6b90e48f86a117236d0198558815

          SHA512

          9d9ea21ba1e3b80d1cd27cd97b20854925f4dd4e85b4e708c9e0b0120db73067f3aff503b5808b4e43ecafb08b15a3bd94ef9ad93ec61139be9683a5ba42ffe1

        • memory/1956-1-0x0000000000430000-0x0000000000436000-memory.dmp

          Filesize

          24KB

        • memory/1956-2-0x0000000000470000-0x0000000000476000-memory.dmp

          Filesize

          24KB

        • memory/1956-0-0x0000000000500000-0x000000000050B000-memory.dmp

          Filesize

          44KB

        • memory/1956-9-0x0000000000430000-0x0000000000436000-memory.dmp

          Filesize

          24KB

        • memory/1956-15-0x0000000000500000-0x000000000050B000-memory.dmp

          Filesize

          44KB

        • memory/2968-17-0x00000000002C0000-0x00000000002C6000-memory.dmp

          Filesize

          24KB

        • memory/2968-24-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/2968-25-0x0000000000500000-0x000000000050B000-memory.dmp

          Filesize

          44KB