Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    14/06/2024, 14:43

General

  • Target

    2024-06-14_a7ef3ed20e4fd87bcf5dbfa5180e2b77_cryptolocker.exe

  • Size

    43KB

  • MD5

    a7ef3ed20e4fd87bcf5dbfa5180e2b77

  • SHA1

    40d550ea895704325988c16d96631b9c48f9a387

  • SHA256

    92949e253d4e8f1c7836d35b81433441b1be9ae9cb73d550f3a99e4488cd1f95

  • SHA512

    dd3515ca6148a8d5de4753ff09a90a940030a29f323f686bd0693eae939e4556e7ccd28e8e3ec612d2c2728ed54f309ac7e417361d1b9b432a71355d22ce3042

  • SSDEEP

    768:wHGGaSawqnwjRQ6ESlmFOsPoOdQtOOtEvwDpjm6WaJIOc+UPPEkL7vF1TU:YGzl5wjRQBBOsP1QMOtEvwDpjgarrkLU

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 3 IoCs
  • Detection of Cryptolocker Samples 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-14_a7ef3ed20e4fd87bcf5dbfa5180e2b77_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-14_a7ef3ed20e4fd87bcf5dbfa5180e2b77_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1960
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    43KB

    MD5

    c7d5e4cb6b6c5b52f9cb3db2119b9108

    SHA1

    bf15dddcfb9b0bb94c49200b3fc6e2e8b498e3a2

    SHA256

    84f185183f5e99cbd073a37bda2dcc9439dfdd4aafcfc3ded5ffc13f1a30e93a

    SHA512

    9243bad5a0bd07b65b2b6a014dbad4dec6e6a19b7f7b4fd9eae15678ecec6335931f02f0a7ed024760535e55c67bc3278303644b3175ee44d92aa45bb03433ff

  • memory/1960-0-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/1960-1-0x0000000000460000-0x0000000000466000-memory.dmp

    Filesize

    24KB

  • memory/1960-9-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/1960-8-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/2324-24-0x0000000000320000-0x0000000000326000-memory.dmp

    Filesize

    24KB

  • memory/2324-23-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB