Analysis

  • max time kernel
    132s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    09-10-2024 14:36

General

  • Target

    2024-10-09_86a2c4a11f14f4e1490c900790cda79b_cryptolocker.exe

  • Size

    46KB

  • MD5

    86a2c4a11f14f4e1490c900790cda79b

  • SHA1

    d1068ea98a81d480383931a5d11ac20f04e4db23

  • SHA256

    223f279bca44360cc59d21737fc496827ec8c8769b84f99a9baa8f9561ddb9de

  • SHA512

    394a1e6724486b4b23036cd2d749538c545f79cf52b7fa7bc5ce3993ec5471321fd71750580d8738f966863f85664fdc5152e1894ffcfe7bd0d8ad9689dbc0ee

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBVaD3TP7DFHuRcD9J1:X6QFElP6n+gJQMOtEvwDpjBmzDkWDh

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-09_86a2c4a11f14f4e1490c900790cda79b_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-09_86a2c4a11f14f4e1490c900790cda79b_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2404
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2300

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    47KB

    MD5

    035972b569f11827e6465669a273fa9a

    SHA1

    ab8e3451f8898694ac42228d3fda173cfd5996a3

    SHA256

    138d86bc14e3525f8b66c403ad4d6840d398ed5c131f9dc11849de886ac26106

    SHA512

    d9fa5c4158ce4770cc4e5c55b32c09f52f56a5aaefca51ff265ff5c8489db221dcbbb6d52d1742d0dbe1688f12a1631aa797e2c575fb259a990e0ae2b6a1047b

  • memory/2300-15-0x0000000000290000-0x0000000000296000-memory.dmp

    Filesize

    24KB

  • memory/2300-22-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2404-7-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2404-1-0x0000000000420000-0x0000000000426000-memory.dmp

    Filesize

    24KB

  • memory/2404-0-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB