Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    29/06/2024, 23:22

General

  • Target

    2024-06-29_50aed51ebfb1be915479048d08ab3cb7_cryptolocker.exe

  • Size

    39KB

  • MD5

    50aed51ebfb1be915479048d08ab3cb7

  • SHA1

    766ba5638a08ae0af25b57e3853fc59fc437e5ad

  • SHA256

    72de26437fb868561789fa3c22a40225d06d8eb7072a02f3068fefdc9298dbc9

  • SHA512

    c0634e143bebf33d9c995a0fd07d728b37acc2cdbb80636a953ac2d55df2414779bcc6000a2d5b73a7716cda0e7f37b5df4df9a984d336598dcdaff90c88029a

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBVaD3TP7DFCw02:X6QFElP6n+gJQMOtEvwDpjBmzDU52

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-29_50aed51ebfb1be915479048d08ab3cb7_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-29_50aed51ebfb1be915479048d08ab3cb7_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2636

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          40KB

          MD5

          e9c8b84d0dc9f2e218845ee96e8313ea

          SHA1

          7a2629dbc68616af4bea4ee3374c66bc78d198ee

          SHA256

          6d7cb16b130f267848411c0ebd0e578b3591983a1989736fba04be7af743b4fb

          SHA512

          a3a932bbc09e14e87c95cbf58501f57a48600e325d6a6cadc9382c6e40359a1c38da9a499f58e9331cc026d3c611535ff4b3fca9d89be3c01e2b36ec52263eb8

        • memory/2148-8-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/2148-0-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/2148-1-0x0000000000300000-0x0000000000306000-memory.dmp

          Filesize

          24KB

        • memory/2636-15-0x0000000000420000-0x0000000000426000-memory.dmp

          Filesize

          24KB