Analysis

  • max time kernel
    132s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 04:23

General

  • Target

    2024-09-19_2ba1c5665e840aab023316cfb4a7efad_cryptolocker.exe

  • Size

    47KB

  • MD5

    2ba1c5665e840aab023316cfb4a7efad

  • SHA1

    78d0481c82df8c7c1c1e8e363c76484f29fd9ef4

  • SHA256

    03714991c24d52c138ab24d6ca81aca344752d681063d9672ebd6624ca836c96

  • SHA512

    7ecb94dd8f3b1ac9fddf5362c4fb3b13daf7e86854f83c6e481ba50d18e89de6578d960cfe639ef87f5dd5286a273985878eb31dacd36f1f32e75124158118c2

  • SSDEEP

    768:y6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpjbXOQ69zbjlAAX5e9zr+:y6QFElP6n+gMQMOtEvwDpjbizbR9Xwza

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-19_2ba1c5665e840aab023316cfb4a7efad_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-19_2ba1c5665e840aab023316cfb4a7efad_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2224

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    47KB

    MD5

    2f17540becc65e3c98a88559f0813577

    SHA1

    cfa9dda54ae4ff93ed821713747e7a8e691b4df9

    SHA256

    69da81e7ac9173f134e3c38937936d78091ebdce4ca6d45bbbd751355ed505f9

    SHA512

    d772fbd77b04d8c70b63329e3a785c984ed422042f5fdcf23738442e43f700977947f9754681cfe18b3f3a61e152e67fce7c61848dc6313daf304b52fec03b46

  • memory/2024-1-0x0000000000290000-0x0000000000296000-memory.dmp

    Filesize

    24KB

  • memory/2024-8-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2024-0-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2224-22-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/2224-15-0x00000000004C0000-0x00000000004C6000-memory.dmp

    Filesize

    24KB