Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05/06/2024, 02:29

General

  • Target

    2024-06-05_35c066a841f8137142544763dae151a1_cryptolocker.exe

  • Size

    47KB

  • MD5

    35c066a841f8137142544763dae151a1

  • SHA1

    c9ed9d791acc2b29a8bbd8019d1d68436d910207

  • SHA256

    9c8ff0d147799276fc55903ff2a523e28dd0f3d82274049d9f7bfa0d4458a36e

  • SHA512

    fec9367fe327076f140cae5e3a9080114b77f2485127b7364927832811212dddfc2a2575d4ef31d4a3089ba6a8e49af9ac62b38af242a3f70ebf5ea951bcc57a

  • SSDEEP

    768:P6LsoEEeegiZPvEhHS5+Mh/QtOOtEvwDpjBpaD3TUogs/VXpAP4:P6QFElP6k+MRQMOtEvwDpjBQpVXR

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-05_35c066a841f8137142544763dae151a1_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-05_35c066a841f8137142544763dae151a1_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1772
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    47KB

    MD5

    ef837c53e7e0063aa9439fd581e4aa53

    SHA1

    62492373a9faafb0614b40877f58907dcd092e7b

    SHA256

    1c26048b1ad3e9c8054a96431cf0c8aa23210cb69851726e7d4488174792ac30

    SHA512

    ef40a26168bba9f13abe48d281f6906b904c658fc4c9b00ec531e0dc1e004d2f072ea2974c62c5e89b64d34b507f2e210d0d0ab6e7f089471b99a75bc0608793

  • memory/1772-0-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/1772-1-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/1772-2-0x0000000000200000-0x0000000000206000-memory.dmp

    Filesize

    24KB

  • memory/1772-9-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/1772-15-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/2760-24-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB