Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    01/06/2024, 08:30

General

  • Target

    2024-06-01_d5cc9ac80f4cffa515a514a2f583fe68_cryptolocker.exe

  • Size

    97KB

  • MD5

    d5cc9ac80f4cffa515a514a2f583fe68

  • SHA1

    486778acc7e72022dda1d1b6bc41683854e9afe2

  • SHA256

    ac05e25052da4d23e560b87f7253be3387cb927607520d4ce50e3cedb3d17a19

  • SHA512

    a4474f9ed9d0d7d63827bd4a9c6764995720fc4f528730ac6042f2f2b88d4a0d8663bf5b28acc95e903d77d0b1bf67123ab8fbd02e33b8ea6b6dc6f5abf8813f

  • SSDEEP

    1536:Z6QFElP6n+gMQMOtEvwDpjQGYQbN/PKwNC4wra:Z6a+pOtEvwDpjtzD

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-01_d5cc9ac80f4cffa515a514a2f583fe68_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-01_d5cc9ac80f4cffa515a514a2f583fe68_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2416
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2932

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    97KB

    MD5

    92874a9658b2d543da0d39aa4b0fc38f

    SHA1

    80d764cda3bb6e0591ef19224c625f82b5b37f82

    SHA256

    981e111d30ebdc3e8acca70a41688bcad4e4488c774c229907196742a8a4dc1d

    SHA512

    890a140bb0224716609b1d282639d79f15f62b22cd9224cc7aec09f19b5a834569a86179dace4336b6734b7c94f20dec88bce3fafaa4b4e5b7c04fc3246f914b

  • memory/2416-0-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2416-1-0x0000000000440000-0x0000000000446000-memory.dmp

    Filesize

    24KB

  • memory/2416-8-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2932-15-0x0000000000460000-0x0000000000466000-memory.dmp

    Filesize

    24KB

  • memory/2932-22-0x0000000000420000-0x0000000000426000-memory.dmp

    Filesize

    24KB