Analysis

  • max time kernel
    132s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25/09/2024, 04:40

General

  • Target

    2024-09-25_ef935cada454d115b76e12f0a5c74c0f_cryptolocker.exe

  • Size

    42KB

  • MD5

    ef935cada454d115b76e12f0a5c74c0f

  • SHA1

    1d3ecee2df7748846f70a5e6983a6a2cc9f29ca0

  • SHA256

    8a8e3c38132a97c5c5f012bce6aebd7c39b7b5382ef42630f267811188e4d76e

  • SHA512

    8b9f96e99b5b71a922e9a9782d33fe7c7f5ed7a6c8126bf32e44e6e1f701f248e8447510e117dee961506a9e7021e30c97b4fecc45cc12d03a6df5c933acda57

  • SSDEEP

    384:e/4wODQkzonAYsju5N/surDQtOOtEvwDpjqIGROqS/WccJVJwi2B5ci+Q:79inqyNR/QtOOtEvwDpjBKccJVODvce

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-25_ef935cada454d115b76e12f0a5c74c0f_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-25_ef935cada454d115b76e12f0a5c74c0f_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1880
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2316

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    42KB

    MD5

    47e5c5b0b30968694303a1332dc61dca

    SHA1

    f52174094a3b676c4454faba158faa8c0c956286

    SHA256

    5a29a3a4b0d9777f44f92e72e718db089955d8ad2334cdffa52c8cc67c0a7253

    SHA512

    9d4be00b86b6c49bb0baa1557667c29deaf43f7bcb2b560274984f45008108e41eb5eb47688d33efa40531acc66c155649200927bf01baf76e49d60b52564f73

  • memory/1880-0-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/1880-1-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/1880-3-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB

  • memory/1880-2-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/1880-15-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/2316-17-0x0000000000290000-0x0000000000296000-memory.dmp

    Filesize

    24KB

  • memory/2316-24-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2316-25-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB