Analysis

  • max time kernel
    132s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29-09-2024 01:32

General

  • Target

    2024-09-29_dc569e8f410a37beec0d4fee64c974df_cryptolocker.exe

  • Size

    57KB

  • MD5

    dc569e8f410a37beec0d4fee64c974df

  • SHA1

    b171406f1e4028f706416ab00eaad53094b9e59b

  • SHA256

    c4bde58fa9b74dafa031c0038ea5a764d08787a852015afa5ac7aa0dae3d7f83

  • SHA512

    bdfd6db1e61676a2426edb48f7f6c47a692f7982aa63295097c977598cf68fc17f0bbef65cab853f4e2402c98784db305110271d303f3af04a706a9ee379fef9

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjyaLccCKdulcrJuA:V6a+pOtEvwDpjv9p

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-29_dc569e8f410a37beec0d4fee64c974df_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-29_dc569e8f410a37beec0d4fee64c974df_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    58KB

    MD5

    c9ef5533bcefc2440190091107afda82

    SHA1

    11aac8cd5d31ff4d2f02e0eb5aff8690131abc79

    SHA256

    b21627e09d32de4aa52a5ad9ac9efcccf70f5b95a27cc91d94b79f57387ede9a

    SHA512

    e0ea8b57fef7afcb0414c414536c4bfd3be8547e271dbf0fcbad55cee98344dd0274a7699a4606e12cbd48196d8bfa48d0b02fcbe387dcae6192fa6060e1d0cb

  • memory/2380-0-0x00000000001C0000-0x00000000001C6000-memory.dmp

    Filesize

    24KB

  • memory/2380-1-0x00000000003F0000-0x00000000003F6000-memory.dmp

    Filesize

    24KB

  • memory/2380-8-0x00000000001C0000-0x00000000001C6000-memory.dmp

    Filesize

    24KB

  • memory/3020-22-0x00000000002D0000-0x00000000002D6000-memory.dmp

    Filesize

    24KB

  • memory/3020-15-0x0000000000310000-0x0000000000316000-memory.dmp

    Filesize

    24KB