Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    02-11-2024 06:29

General

  • Target

    2024-11-02_1370f4900667c38b3b3626e0aa3e04b0_cryptolocker.exe

  • Size

    31KB

  • MD5

    1370f4900667c38b3b3626e0aa3e04b0

  • SHA1

    effeb21c642a8a002f4822a94360a5c140d06bf0

  • SHA256

    46fd1d0cff322d94259be3cfcdf9e1679de5962ff2c569a62e8e06755a77512f

  • SHA512

    24a1161f36502ee677146d645bb893e8014bbbe8f29b1a814dcc2f124941e4e08aac5bc9413a579e3a12df3ac4d6577211bffcab49628910fb8b8e517f696d1c

  • SSDEEP

    768:I6LsoEEeegiZPvEhHSG+gbIBrtOOtEvwDpj79:I6QFElP6n+gs5MOtEvwDpjp

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-11-02_1370f4900667c38b3b3626e0aa3e04b0_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-11-02_1370f4900667c38b3b3626e0aa3e04b0_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2852
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    31KB

    MD5

    e90676427e6038767ec8e0af344fb558

    SHA1

    a1cbe86ce75c057625a5f8c13aae0cc8b98b2b96

    SHA256

    c8c7dff7e37b03f52d0b6ac6154fc54cc19f0d180aef7429f89f14f2649b7a39

    SHA512

    5728424d9d379d86dc02fc365460c45a62c20bf77de1795c2c7cdf3d4ee9575e5d4c009d7b56bbb78220e04b73ceda609574da3b63e2b65dd34a51522b2cc8b9

  • memory/2744-16-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/2744-25-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2744-18-0x0000000000420000-0x0000000000426000-memory.dmp

    Filesize

    24KB

  • memory/2744-26-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/2852-0-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/2852-2-0x0000000000290000-0x0000000000296000-memory.dmp

    Filesize

    24KB

  • memory/2852-9-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2852-1-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2852-14-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB