Analysis

  • max time kernel
    132s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    18-10-2024 03:58

General

  • Target

    2024-10-18_aa0dd74d04f9a1821acc0605caffc185_cryptolocker.exe

  • Size

    73KB

  • MD5

    aa0dd74d04f9a1821acc0605caffc185

  • SHA1

    3fa4752ce2c31a12cd7958402901f72d87b0c996

  • SHA256

    400d63c347eeb773568257a3da979378cf3ec49a4eacb5ab69cd60710594513a

  • SHA512

    75087a8783d4f7d810da124a30ea87114606d7e77125ec910b2b942571a8e2f5975132a96a5335871c547cca636bd7748d653c272d7ac20712407e46c24e1b5c

  • SSDEEP

    1536:Dk/xY0sllyGQMOtEvwDpjwycDtKkQZQRKb61vSbgZ3QzNKUNZO53:DW60sllyWOtEvwDpjwF85S

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-18_aa0dd74d04f9a1821acc0605caffc185_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-18_aa0dd74d04f9a1821acc0605caffc185_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2432
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2412

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    73KB

    MD5

    1ef714d19b3485c3ca4c88374a973b45

    SHA1

    b76000d06c2dad12802d1f5644ef18086003127f

    SHA256

    8f728c7d5ccba2f8696a42cc7842b876d13ec29591eacbf35f6d807a1ab81e46

    SHA512

    8491d0dadeb8634461dff7bfe8b73104e6a3454c3958eeb036a488de86604bccdb794d6f8d61819db034d21e6fcc5635a7387fb4569a46d3b82ed3e599b70471

  • memory/2412-17-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/2412-19-0x0000000000300000-0x0000000000306000-memory.dmp

    Filesize

    24KB

  • memory/2412-26-0x00000000002B0000-0x00000000002B6000-memory.dmp

    Filesize

    24KB

  • memory/2412-27-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/2432-0-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/2432-2-0x0000000000310000-0x0000000000316000-memory.dmp

    Filesize

    24KB

  • memory/2432-9-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2432-1-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2432-15-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/2432-14-0x0000000000660000-0x000000000066B000-memory.dmp

    Filesize

    44KB