Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13-10-2024 01:46

General

  • Target

    2024-10-13_f70f9456c9910a1a03b3659f65537426_cryptolocker.exe

  • Size

    75KB

  • MD5

    f70f9456c9910a1a03b3659f65537426

  • SHA1

    3591626964762ff20df5a3c37b7d6ee44475d780

  • SHA256

    6439beaecdec7ccba7a105d35d5a190d2c3c7e021d473bc579b2085b981adf4a

  • SHA512

    1a1e86ba47126dfdb5bc75767ca06ebb9cf9e74530d70c7ed6fa6688732b4fb06d96554151c475fae8ff132b057533f55e3baa038ba5c0cf6b1689ef26541579

  • SSDEEP

    768:u6LsoEEeegiZPvEhHSG+gZgtOOtEvwDpjeY10Y/YMsMq:u6QFElP6n+gWMOtEvwDpjJGYQbN

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-13_f70f9456c9910a1a03b3659f65537426_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-13_f70f9456c9910a1a03b3659f65537426_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2656
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    75KB

    MD5

    7ff8900f8447ed3f8f5324592cd85c95

    SHA1

    fe7e9410b05d41516b348df7024c9e8b37069890

    SHA256

    c7a7435126fc28c71a084c7009bb26e1cedae510f50e4ee683e7ec9b9b2f6c75

    SHA512

    5dc9e80d3f7196f6e29c723510354888dcc950e353862c25c0f292c529616a6a3236144470b96d555afd7f5a698f7fb1da0f8b0109f9c9a7b42b2d80e79be1e9

  • memory/2616-22-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB

  • memory/2616-15-0x0000000000420000-0x0000000000426000-memory.dmp

    Filesize

    24KB

  • memory/2656-0-0x00000000002D0000-0x00000000002D6000-memory.dmp

    Filesize

    24KB

  • memory/2656-1-0x0000000000610000-0x0000000000616000-memory.dmp

    Filesize

    24KB

  • memory/2656-8-0x00000000002D0000-0x00000000002D6000-memory.dmp

    Filesize

    24KB