Analysis

  • max time kernel
    131s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    31-10-2024 08:17

General

  • Target

    2024-10-31_fd265d78d9883573927734e9815213e7_cryptolocker.exe

  • Size

    40KB

  • MD5

    fd265d78d9883573927734e9815213e7

  • SHA1

    5a9d70cb3ba923e58e0560be238b2477ecf4633e

  • SHA256

    1d6603d98dc8c1c9c939d91f19399d5657a55967d4c3ae063e3bc0bfaa4164e4

  • SHA512

    96e26d76e1b026338a1d5c4c06d71d217d7263dc733e89145c5f50ae2a3ae07bde5dbcc606c4d1e641ae5fb7236b1a5b9c1be76ecb4dfd241eede9b3df348236

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBaacQsdRLIk:X6QFElP6n+gJQMOtEvwDpjBsQpk

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-31_fd265d78d9883573927734e9815213e7_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-31_fd265d78d9883573927734e9815213e7_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:348
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    40KB

    MD5

    fa55b89ca13ac86ae00657884301dc60

    SHA1

    8640f1bf7868966e2b2ca09c8819a1e7a6e0b77d

    SHA256

    11a05cb24050b4e1844b06b7e187f7cc65164d66d12acb9081e0f34e92fcaf09

    SHA512

    e02405dc277c4749e6bb0a9332d4dc60897f766269ec61a3a68fbc72bd31e6d2d7dca233510a8d8feb4988a781be7957afa524be4929f2874d32de3541ce91fa

  • memory/348-0-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/348-1-0x0000000000290000-0x0000000000296000-memory.dmp

    Filesize

    24KB

  • memory/348-7-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2512-16-0x0000000000300000-0x0000000000306000-memory.dmp

    Filesize

    24KB

  • memory/2512-15-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB