Analysis

  • max time kernel
    159s
  • max time network
    171s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2023, 13:28

General

  • Target

    2023-08-26_838c47c4270d397da107abbb2d97c146_cryptolocker_JC.exe

  • Size

    81KB

  • MD5

    838c47c4270d397da107abbb2d97c146

  • SHA1

    73b9ba4c91196df8bfc24dc933195894dfa5f38f

  • SHA256

    e6a943dbfe3f0ee894d29bdac3bc33bbf173992ad8e2d31705c81551e5cdbf26

  • SHA512

    0f2a8d62f5c671bcc755c00df6f92de692fcf99291edd02ed86d7b010945f74873aa2e31d03566979477bb9f92c3d73c91c10c7d7a35bbd05ae1ad2341038dd0

  • SSDEEP

    768:qkmnjFom/kLyMro2GtOOtEvwDpjeY10Y/YMsvlMdwPK80GQuchoIS:qkmnpomddpMOtEvwDpjJGYQbN/PKwMS

Score
7/10
upx

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2023-08-26_838c47c4270d397da107abbb2d97c146_cryptolocker_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\2023-08-26_838c47c4270d397da107abbb2d97c146_cryptolocker_JC.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4500
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2228

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          81KB

          MD5

          1f8ab829c132f524e570aa271617b33e

          SHA1

          5dfe71e035dec857a45d26232d84b31b68615a24

          SHA256

          faa52d034b3c01b50672c5145f636afe15542a7f6abd5c5b67645d8be22d5aa4

          SHA512

          716a50674c8d8ea59686c788ca0c17c88c0bc798ded3862b08b5e112a5041e7a9e2ef91e13de72096f445291c2d8db6a5698011877420ae9d87cb76bf0e5f9c8

        • C:\Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          81KB

          MD5

          1f8ab829c132f524e570aa271617b33e

          SHA1

          5dfe71e035dec857a45d26232d84b31b68615a24

          SHA256

          faa52d034b3c01b50672c5145f636afe15542a7f6abd5c5b67645d8be22d5aa4

          SHA512

          716a50674c8d8ea59686c788ca0c17c88c0bc798ded3862b08b5e112a5041e7a9e2ef91e13de72096f445291c2d8db6a5698011877420ae9d87cb76bf0e5f9c8

        • C:\Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          81KB

          MD5

          1f8ab829c132f524e570aa271617b33e

          SHA1

          5dfe71e035dec857a45d26232d84b31b68615a24

          SHA256

          faa52d034b3c01b50672c5145f636afe15542a7f6abd5c5b67645d8be22d5aa4

          SHA512

          716a50674c8d8ea59686c788ca0c17c88c0bc798ded3862b08b5e112a5041e7a9e2ef91e13de72096f445291c2d8db6a5698011877420ae9d87cb76bf0e5f9c8

        • memory/2228-30-0x0000000000500000-0x000000000050F000-memory.dmp

          Filesize

          60KB

        • memory/4500-0-0x0000000000500000-0x000000000050F000-memory.dmp

          Filesize

          60KB

        • memory/4500-1-0x0000000000500000-0x000000000050F000-memory.dmp

          Filesize

          60KB

        • memory/4500-2-0x00000000004D0000-0x00000000004D6000-memory.dmp

          Filesize

          24KB

        • memory/4500-3-0x00000000004D0000-0x00000000004D6000-memory.dmp

          Filesize

          24KB

        • memory/4500-4-0x0000000000500000-0x000000000050F000-memory.dmp

          Filesize

          60KB

        • memory/4500-5-0x00000000004F0000-0x00000000004F6000-memory.dmp

          Filesize

          24KB