Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    25-09-2024 08:21

General

  • Target

    2024-09-25_268f0f20ff79ee60aba088d47583acb9_cryptolocker.exe

  • Size

    52KB

  • MD5

    268f0f20ff79ee60aba088d47583acb9

  • SHA1

    ffb48a51c9fafd3c401d584b782d49f542abbf68

  • SHA256

    fad63a3a41f97b41ac903d6de1a908e432d765bb226a35125ddfbb9c369103d5

  • SHA512

    8edbe60b9e33456107356be46209cb232a3cb5d2ce73300a318b8e5784d25e599e1d8cdb222493cfb3f9ee5bdc5937a92f34b43f7cdcb7ceabd41222fef26a0e

  • SSDEEP

    768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpj/MLa5VccP6aDXlmfwV:V6QFElP6n+gMQMOtEvwDpjyaLccCGXlX

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-25_268f0f20ff79ee60aba088d47583acb9_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-25_268f0f20ff79ee60aba088d47583acb9_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2320
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2212

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    52KB

    MD5

    5482482ce27416c2ae19f566bc44587a

    SHA1

    2837a2ec20be0d4bf16432ac76decb6fdac6a095

    SHA256

    b420f771f6d691225c092d78045f5961470c6455c52adf1874044246b858e03a

    SHA512

    bccf14072c6f1205d22bbebfdeb84c1254a12ca51b6c5421194b6e00ef010327b96afc7a474c9b77e33ca3e2e2d5d84e8d5dcfb8a84398d1bfbae35bb42a6a04

  • memory/2212-22-0x0000000000260000-0x0000000000266000-memory.dmp

    Filesize

    24KB

  • memory/2212-15-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/2320-1-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2320-2-0x0000000000350000-0x0000000000356000-memory.dmp

    Filesize

    24KB

  • memory/2320-0-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB