Analysis

  • max time kernel
    166s
  • max time network
    172s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-10-2023 07:55

General

  • Target

    NEAS.2023-09-05_e6fb98a779fb2421f6e4acdf8ff9a6f1_cryptolocker_JC.exe

  • Size

    89KB

  • MD5

    e6fb98a779fb2421f6e4acdf8ff9a6f1

  • SHA1

    2dfdfc8c264f24ed166d0f39440fc9846f8ac2da

  • SHA256

    a9f366e21f8448cfbb7966d60056be7cb8422859d6c009924b80e350d66fc307

  • SHA512

    12d3af278db1ef2439f7bf0a55eb35f6975d699657f06688bc71fba64de7a16bb9c92d46a8e5759d70e496f1c72b27e1876f79b20fb320e11565226d53277b65

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjQGYQbNcqamvWHShl/3S0:V6a+pOtEvwDpjt9

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-05_e6fb98a779fb2421f6e4acdf8ff9a6f1_cryptolocker_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-05_e6fb98a779fb2421f6e4acdf8ff9a6f1_cryptolocker_JC.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3792
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2364

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    89KB

    MD5

    48a9fe31894105c2e7af3ddcd661a81d

    SHA1

    ada02ddb5c626f6863a8781bf048a86cf0c0abfe

    SHA256

    77b4237dcc20a3971641a4571b71a4440ef8a0474ef24d56071432da9d2feb17

    SHA512

    eb62a82bc474a479d5998a18254b53bb324f6d0958d450415be4fafdb77fdb958ad01b94569f6912782202f0e3ebba768224bddc67497e6ed3d6d698e1adfe8c

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    89KB

    MD5

    48a9fe31894105c2e7af3ddcd661a81d

    SHA1

    ada02ddb5c626f6863a8781bf048a86cf0c0abfe

    SHA256

    77b4237dcc20a3971641a4571b71a4440ef8a0474ef24d56071432da9d2feb17

    SHA512

    eb62a82bc474a479d5998a18254b53bb324f6d0958d450415be4fafdb77fdb958ad01b94569f6912782202f0e3ebba768224bddc67497e6ed3d6d698e1adfe8c

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    89KB

    MD5

    48a9fe31894105c2e7af3ddcd661a81d

    SHA1

    ada02ddb5c626f6863a8781bf048a86cf0c0abfe

    SHA256

    77b4237dcc20a3971641a4571b71a4440ef8a0474ef24d56071432da9d2feb17

    SHA512

    eb62a82bc474a479d5998a18254b53bb324f6d0958d450415be4fafdb77fdb958ad01b94569f6912782202f0e3ebba768224bddc67497e6ed3d6d698e1adfe8c

  • memory/2364-17-0x00000000021C0000-0x00000000021C6000-memory.dmp

    Filesize

    24KB

  • memory/3792-0-0x00000000021D0000-0x00000000021D6000-memory.dmp

    Filesize

    24KB

  • memory/3792-1-0x00000000021D0000-0x00000000021D6000-memory.dmp

    Filesize

    24KB

  • memory/3792-2-0x00000000020E0000-0x00000000020E6000-memory.dmp

    Filesize

    24KB