Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    31-10-2024 08:13

General

  • Target

    2024-10-31_f17a03a3009035502e26a03827cfd1b6_cryptolocker.exe

  • Size

    28KB

  • MD5

    f17a03a3009035502e26a03827cfd1b6

  • SHA1

    b767ec4f1b7503fb0f7b25d29543c2327d645b1d

  • SHA256

    64bf0352a9de92423c6e3f24e886e86365ea3330ec118b2ffe5a8b8f0128203b

  • SHA512

    c5a54de964381f8b889869172a48a8b4abba1a5ebafb13a8e021c5160b969c88f8af5b6bca9537e0311778c02baecfe0a4389bed7cf624049a35c21647cb7ca1

  • SSDEEP

    768:jOb2gOo0mw18ae8MrQRN7DctOOtEvwDpjQ:jKUog898rYMOtEvwDpjQ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-31_f17a03a3009035502e26a03827cfd1b6_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-31_f17a03a3009035502e26a03827cfd1b6_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2192
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    28KB

    MD5

    6f1ff35968542aabc89b8de24714a8b5

    SHA1

    526af8b27dd91e1feaa30150119fb30496943b50

    SHA256

    0009a6c91e4bd1f841fd3157fc0812f0102d7f4395b025608855ba48e724080f

    SHA512

    bf8e04ea5f87444791f33385b7186d8b2b8f902508f1743f96cf559d8823c759346c594f109f726c557d297a86af37c28457fe430d8041e31b45409e64ddc6a0

  • memory/2192-0-0x0000000000500000-0x0000000000514000-memory.dmp

    Filesize

    80KB

  • memory/2192-1-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2192-2-0x0000000000290000-0x0000000000296000-memory.dmp

    Filesize

    24KB

  • memory/2192-9-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2192-16-0x0000000000500000-0x0000000000514000-memory.dmp

    Filesize

    80KB

  • memory/2192-27-0x0000000000640000-0x0000000000654000-memory.dmp

    Filesize

    80KB

  • memory/2752-17-0x0000000000500000-0x0000000000514000-memory.dmp

    Filesize

    80KB

  • memory/2752-19-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2752-20-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB

  • memory/2752-28-0x0000000000500000-0x0000000000514000-memory.dmp

    Filesize

    80KB