Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    12-06-2024 23:27

General

  • Target

    2024-06-12_4ddae2179298b4d10963d49eeee2ff2c_cryptolocker.exe

  • Size

    47KB

  • MD5

    4ddae2179298b4d10963d49eeee2ff2c

  • SHA1

    d28c4f67efb066d664b880d45d7302f44e0547d6

  • SHA256

    68ee359596197f9cc6b701f26c0a8a95bc8e3b34913163f485b596af4027d440

  • SHA512

    c3645f87236616cf7ff119f972d0f1fcbdb67d856aa11a0ad05393cd89d3707e54e2e1af3e4dc0aa96b39ef53722a51c42b23d592195cc4a0428cef4172f9eeb

  • SSDEEP

    768:P6LsoEEeegiZPvEhHS5+Mh/QtOOtEvwDpjBpaD3TUogs/VXpAPYY:P6QFElP6k+MRQMOtEvwDpjBQpVXjY

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Detection of Cryptolocker Samples 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-12_4ddae2179298b4d10963d49eeee2ff2c_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-12_4ddae2179298b4d10963d49eeee2ff2c_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2964
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:3036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    47KB

    MD5

    21209ad763f979e6e7bb11ad9b7eddc8

    SHA1

    4b750cb65aa787a876b235a575b4cb47059d23eb

    SHA256

    c4c4d79cfd8f83538b0ee80e2c3f9f00437ded2a6b6b438e3e7614d168ce2b76

    SHA512

    0a88660ad6fb4554e3840a087703712ac7fa0b8b80020a5daea460fe14374350f48aedc095a73cc4369f922401246d3d57d68c34bc1f2264039a7a88c5b620fa

  • memory/2964-0-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/2964-1-0x0000000000290000-0x0000000000296000-memory.dmp

    Filesize

    24KB

  • memory/2964-2-0x0000000001CD0000-0x0000000001CD6000-memory.dmp

    Filesize

    24KB

  • memory/2964-9-0x0000000000290000-0x0000000000296000-memory.dmp

    Filesize

    24KB

  • memory/2964-15-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/3036-16-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/3036-18-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB

  • memory/3036-25-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/3036-26-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB