Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-10-2024 12:27

General

  • Target

    2024-10-06_b3668e81488c360b7d6c1663b8e19f44_cryptolocker.exe

  • Size

    96KB

  • MD5

    b3668e81488c360b7d6c1663b8e19f44

  • SHA1

    7060b62f73d2dacdcd6526ae2de2f17aa87955d6

  • SHA256

    29a713e72aa776856e721ba446208023c1f4f645b772633bdd0bd6d929a24653

  • SHA512

    a49469b678665ede25840ddfa6e2f0eda3d56d6b9cd8736c8b560b1cc553422657c80800b0740b0854d94504053db607f35c988f0849a18a0606a7a56d899839

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjQGYQbN/PKwNuj2GQi8YU:V6a+pOtEvwDpjtz1

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-06_b3668e81488c360b7d6c1663b8e19f44_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-06_b3668e81488c360b7d6c1663b8e19f44_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2768
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    96KB

    MD5

    da88495fdadb7c3ad0ffdf179dfc90e8

    SHA1

    0da4fb23b39a23d699f5fd2e3ff6a1026cf4810f

    SHA256

    e865661104664115f6dac9b5da7cecc87dab5936206c64a7c7a4622a45018876

    SHA512

    197c959372cee898d79ce5a74b49da8fdc8f63ee772a000f55f6c542d16345fde563abde6927463392e645f543f2b4d82437d79e096139b8ab26d6076dcde0eb

  • memory/2768-8-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/2768-1-0x0000000000460000-0x0000000000466000-memory.dmp

    Filesize

    24KB

  • memory/2768-0-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/2824-22-0x0000000000460000-0x0000000000466000-memory.dmp

    Filesize

    24KB

  • memory/2824-15-0x00000000004B0000-0x00000000004B6000-memory.dmp

    Filesize

    24KB