Analysis

  • max time kernel
    131s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18/10/2024, 00:37

General

  • Target

    2024-10-18_69bfeb11ff38b9ad25829d1d6fccb0bc_cryptolocker.exe

  • Size

    53KB

  • MD5

    69bfeb11ff38b9ad25829d1d6fccb0bc

  • SHA1

    f250debcfe9970130fec0b6876b05536b9a26db1

  • SHA256

    bc44b629b2963fdff2bdf05d0af98ad07e7f3ac34e3c3dd6861ae322b4333886

  • SHA512

    b79e327caf2ab67cb32dc14afb689725a13dd1411f96c6db54624bf953d13a3ac2559cf5316f84572c10ded2c745152b537d8828ccaa6ed6852eb9ec86dca8b4

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjyaLccCGXl9niNs:V6a+pOtEvwDpjvDf

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-18_69bfeb11ff38b9ad25829d1d6fccb0bc_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-18_69bfeb11ff38b9ad25829d1d6fccb0bc_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1324
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2472

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          53KB

          MD5

          4a2a3d75f22c65593726d0574c76a902

          SHA1

          49e0b3180d65f7c3d17be85e3ce45d8c0735c84a

          SHA256

          733e766e8d192e97652de46f3197967345fc3e5170b668d3cd94c562d3eba200

          SHA512

          0283698c3580e96ae8154fdf6dda713a607d37ef1df2c07d222fe518167421808d35bd85e2ae9f3818aec94b9b62a4191cc18c3ed138e6d72f632447bed94d8b

        • memory/1324-1-0x0000000000300000-0x0000000000306000-memory.dmp

          Filesize

          24KB

        • memory/1324-8-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/1324-0-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/2472-22-0x0000000000330000-0x0000000000336000-memory.dmp

          Filesize

          24KB

        • memory/2472-15-0x0000000000470000-0x0000000000476000-memory.dmp

          Filesize

          24KB