Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    01-10-2024 20:11

General

  • Target

    2024-10-01_c4043dba0f86c1398b9db1757fdbdddb_cryptolocker.exe

  • Size

    38KB

  • MD5

    c4043dba0f86c1398b9db1757fdbdddb

  • SHA1

    5c42a2f2cb2ca17ad05bf2904dd80c09db31013b

  • SHA256

    16636dadc62cdb86898f8d6d86108cdcce893d1a25333e35fae6b92cff8483f7

  • SHA512

    282fa0d5daa0502975a80fb381756176e309badcf3d045eb4bde61f262f1f4ce16480250d069191b2d9dd4d6a5907979eeeee6eb93e8f04ce775cfe175d19a5d

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITs:qDdFJy3QMOtEvwDpjjWMl7Ts

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-01_c4043dba0f86c1398b9db1757fdbdddb_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-01_c4043dba0f86c1398b9db1757fdbdddb_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2668
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2944

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    38KB

    MD5

    359cd7ef6c0e8be5dbe4323748332399

    SHA1

    b1be4dc5728da3691c844518d427858c4a09de1b

    SHA256

    82fa7e076738f7ec890cf261af0c81bbb646832165308960e867915d12039d24

    SHA512

    4a909733693569093cc345c7d83a558207d47974145d96e3a6c80569b58884819249a7ac7abf7d16d55fb45280f194d4c620bd11c04486e6525abd903ffe1336

  • memory/2668-0-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2668-1-0x0000000000420000-0x0000000000426000-memory.dmp

    Filesize

    24KB

  • memory/2668-2-0x0000000000460000-0x0000000000466000-memory.dmp

    Filesize

    24KB

  • memory/2668-9-0x0000000000420000-0x0000000000426000-memory.dmp

    Filesize

    24KB

  • memory/2668-16-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2944-17-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2944-19-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/2944-26-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB

  • memory/2944-27-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB