Analysis

  • max time kernel
    133s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 05:34

General

  • Target

    2024-09-19_c833ea2de178f622af682baddfba5979_cryptolocker.exe

  • Size

    73KB

  • MD5

    c833ea2de178f622af682baddfba5979

  • SHA1

    971d44eb06f7eef9dbc9ba2a2fd2c8dbf2633a2c

  • SHA256

    5782a8c4ea58074593caf8db167ee6b77e4e51bf9dc45c9761b44d7338ff2856

  • SHA512

    db0674ede21e1e2c2228846a74a652a6b24f73b5c7face5b3dbabb59c52c68f326515c3e5271a9eb103bf63420b6a4a00a62aa6d55e3c223635b4c49b61bcc87

  • SSDEEP

    768:u6LsoEEeegiZPvEhHSG+gZgtOOtEvwDpjeY10Y/YMs0:u6QFElP6n+gWMOtEvwDpjJGYQb0

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-19_c833ea2de178f622af682baddfba5979_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-19_c833ea2de178f622af682baddfba5979_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:780
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1424

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    73KB

    MD5

    291191b440a51717f795b99b60e7bcea

    SHA1

    77be1e5f29ea0bc295bb00181b4bad51238e2a9a

    SHA256

    a0e16ca026a02f71b60035afd52e1b719421f20dbf0843f05ef7103fc1b49a30

    SHA512

    5e3ee230b221141312044ceb67755288fd550a6c267bfe3041ad871006bb58d0672d422bfff59f5afb452c08bd6381826965661a9ddbb56891a3246bad214a63

  • memory/780-1-0x0000000000470000-0x0000000000476000-memory.dmp

    Filesize

    24KB

  • memory/780-0-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/780-8-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/1424-15-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/1424-16-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB