Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 03:45

General

  • Target

    2024-09-19_e8621ae53ee3a62a45222bb28eeb1db8_cryptolocker.exe

  • Size

    49KB

  • MD5

    e8621ae53ee3a62a45222bb28eeb1db8

  • SHA1

    e5c4d78343d1cdeaf954d33b6c152a0f7b25dad0

  • SHA256

    c2100573bcedd2cc3c95c5ed30d926f3159f042bc1e8a04bf7340cf8bce02cb1

  • SHA512

    fc29dcc285f7d7fac690726e8b26dd0b861cdadfbf6c526cd1f0c4c2dbb65ccd2490cc7c55cb7bde31baf4834c377ff29a31dad728fbaf519953269b5779ba4a

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBaaEqbIu556BlvsTj:X6QFElP6n+gJQMOtEvwDpjB0GIWSlvIj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-19_e8621ae53ee3a62a45222bb28eeb1db8_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-19_e8621ae53ee3a62a45222bb28eeb1db8_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2136
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    50KB

    MD5

    b8e7ce8826e8d37dc71eb2fac5aa0625

    SHA1

    f75dcf5b17f7dd44500293a69169d2d2f7be408a

    SHA256

    4915ce431f49235f932c9847119932783542d23423a4f6be0309cea90bab4759

    SHA512

    ff1378276d5f97e496931fffec07e416172d4b81c7ed3190e611267487fabbcdc1a8239aac071a24a8b08524295f87cebb5c40c4cb4c1381c084fb5e3d8272c6

  • memory/2136-0-0x00000000002D0000-0x00000000002D6000-memory.dmp

    Filesize

    24KB

  • memory/2136-1-0x0000000000350000-0x0000000000356000-memory.dmp

    Filesize

    24KB

  • memory/2136-8-0x00000000002D0000-0x00000000002D6000-memory.dmp

    Filesize

    24KB

  • memory/2708-22-0x00000000002B0000-0x00000000002B6000-memory.dmp

    Filesize

    24KB

  • memory/2708-15-0x0000000000300000-0x0000000000306000-memory.dmp

    Filesize

    24KB