Analysis

  • max time kernel
    132s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-09-2024 01:03

General

  • Target

    2024-09-07_077564790f20713fdeb95d0cddfd7d3e_cryptolocker.exe

  • Size

    80KB

  • MD5

    077564790f20713fdeb95d0cddfd7d3e

  • SHA1

    c3d70bfe7b9898e5e59207ec4f305280afeec48c

  • SHA256

    0ade8cbc16e56cc12b4fecbd21151cc67e7e915003817fd5d9c797331ddc3d6b

  • SHA512

    f161c1098edcec1b6ea2a4d028dcb1901b3abde00af9424d0753cb5a710f3d7e311e918fdbafb949fb3eda8cee29a95dd4089e602166f0a9b044e5e5fa652df1

  • SSDEEP

    1536:X6QFElP6n+gJQMOtEvwDpjBZYTjipvF2bx1rHsoLktNx:X6a+SOtEvwDpjBZYvQd2K

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-07_077564790f20713fdeb95d0cddfd7d3e_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-07_077564790f20713fdeb95d0cddfd7d3e_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3048
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2348

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    80KB

    MD5

    95c891b8220c8141d2cad113ed26cc5c

    SHA1

    4a9348754a02ff09506f5f2f4d2094f7b1d7c8b3

    SHA256

    117901a3335bc09ba065bd922bc45f412cc98e14e7370a6f09b609818c7e547b

    SHA512

    49a85c976dcdde52e8702cec9a59af60215489431a8bcfc199c4cc0dbbfd78dc0714c7b36824d976d13bf1781daceca27da9db485b2b2206a62f7154699fe0e0

  • memory/2348-15-0x0000000000350000-0x0000000000356000-memory.dmp

    Filesize

    24KB

  • memory/2348-22-0x00000000002D0000-0x00000000002D6000-memory.dmp

    Filesize

    24KB

  • memory/3048-0-0x0000000000320000-0x0000000000326000-memory.dmp

    Filesize

    24KB

  • memory/3048-8-0x0000000000320000-0x0000000000326000-memory.dmp

    Filesize

    24KB

  • memory/3048-1-0x0000000000460000-0x0000000000466000-memory.dmp

    Filesize

    24KB