Analysis

  • max time kernel
    133s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    23-08-2024 13:32

General

  • Target

    2024-08-23_9a7854d9ca235fd8e7b3e41be294f8b7_cryptolocker.exe

  • Size

    55KB

  • MD5

    9a7854d9ca235fd8e7b3e41be294f8b7

  • SHA1

    6bb0d503a4395a1603249053d4ff810652d68b67

  • SHA256

    ee0dea5f88e0f2b3c1ced2a34007c8c2b73f78b5f40b3d2e2be4a573221e99d5

  • SHA512

    87dfcc163ee9370c9f872e2de942c2e7db517f31c4fa4ba745a2c1556fa03184c8bcd79c4b6779db569f9a2b14bd554e07674c893c2c54a08e0b85d49bf832af

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj31ik/9+i:z6a+CdOOtEvwDpj1

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-08-23_9a7854d9ca235fd8e7b3e41be294f8b7_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-08-23_9a7854d9ca235fd8e7b3e41be294f8b7_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2428
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2968

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    55KB

    MD5

    408bc3037b8b0788d3135367717e5c00

    SHA1

    07ce8809f3aaccd3cff5fe12be844246f2bfb1e0

    SHA256

    3fc10a33f70d0e1b8f02f83e69938bd422f36edb3b07082d77b2c79a4d14ac0d

    SHA512

    8c268270c547d7ad0f2e31579ad2695c4de0b823041ba5b00086bf393d179184fbdf82b92307e283db320aaae3fe9e44a501884abaf6016f7556c0b443e92007

  • memory/2428-0-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2428-1-0x0000000000320000-0x0000000000326000-memory.dmp

    Filesize

    24KB

  • memory/2428-9-0x0000000000320000-0x0000000000326000-memory.dmp

    Filesize

    24KB

  • memory/2428-2-0x0000000000470000-0x0000000000476000-memory.dmp

    Filesize

    24KB

  • memory/2428-16-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2428-14-0x00000000006A0000-0x00000000006B0000-memory.dmp

    Filesize

    64KB

  • memory/2968-17-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2968-26-0x00000000002B0000-0x00000000002B6000-memory.dmp

    Filesize

    24KB

  • memory/2968-19-0x0000000000300000-0x0000000000306000-memory.dmp

    Filesize

    24KB

  • memory/2968-27-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB