Analysis

  • max time kernel
    132s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2024, 08:23

General

  • Target

    2024-10-12_0acc35c472e080dadcce0e6c27916b94_cryptolocker.exe

  • Size

    50KB

  • MD5

    0acc35c472e080dadcce0e6c27916b94

  • SHA1

    702804d7f49d828ddf234bfd704097e38bbf6c4c

  • SHA256

    bea884bde861072702407da032c96ef3c261af57ca6c8f5e887f6353bc052bbf

  • SHA512

    fdd849f61b8ae344d823fcf88a4f52adfa61cf648278c6d2e5e9a216098d7d133a74d24d58d31896fc329347a375d9e971a58ba0062b1c615e48cca312435843

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/BtOOtEvwDpjBVaD3E09vdXfOs:X6QFElP6n+gJBMOtEvwDpjBtEdXfOs

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-12_0acc35c472e080dadcce0e6c27916b94_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-12_0acc35c472e080dadcce0e6c27916b94_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1748

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          50KB

          MD5

          aad5d5a361302281b9b3b78cb06e6a48

          SHA1

          41aecea734cd713ccc28e5382bb8e0be904bd177

          SHA256

          8903b802d69a4a74570b5455e3f790f631cd0a7123718d67bdb81df088b3c5c7

          SHA512

          6e70dbd879df56aa20ecf83b7c5fef1f9cdee797826d9f19d21c1f549a9f94a7f65980651a0ec1fcb3a39999f4292fcd6489485d39137b475c3d1bf4c1dbdd8d

        • memory/1712-1-0x0000000000480000-0x0000000000486000-memory.dmp

          Filesize

          24KB

        • memory/1712-8-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/1712-0-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/1748-15-0x0000000000520000-0x0000000000526000-memory.dmp

          Filesize

          24KB

        • memory/1748-22-0x00000000002C0000-0x00000000002C6000-memory.dmp

          Filesize

          24KB