Analysis

  • max time kernel
    160s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/10/2023, 11:13

General

  • Target

    NEAS.2023-09-07_cd828ac21cc24e2e18db90abcf78e2e5_cryptolocker_JC.exe

  • Size

    42KB

  • MD5

    cd828ac21cc24e2e18db90abcf78e2e5

  • SHA1

    b1981b6e2138a96316968837450f76d1c69f204e

  • SHA256

    ad9cca761aa1f40165174f606fcf68c20093844c638823c105fcfaa69040a8be

  • SHA512

    ed25a1107bfab81316818e38de5a64bef634a67853d7f52954c2266eba6298fead577f1f24e8977eb67958f9306f1eef7ee3bbd0ba403dd79604e06a602e5a88

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBaaEqbIu55jOA:X6QFElP6n+gJQMOtEvwDpjB0GIWj9

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-07_cd828ac21cc24e2e18db90abcf78e2e5_cryptolocker_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-07_cd828ac21cc24e2e18db90abcf78e2e5_cryptolocker_JC.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4968
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:3064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    42KB

    MD5

    3bb24e4a55c10262ced7bbb4f9f59fbc

    SHA1

    d36e7a0af77f809b3169750dfa322dab368e25ce

    SHA256

    a49f0210c304987895ea6c7ace967924df1bd05d694d82cafabf3b71ce4e8bd6

    SHA512

    3a688233cdc0c858a1c78bcb2856f726fd92883a04699fcce97cd6bcdda714a50ae7590705062b8aa3e35ac0c86d619d79e0d76ddd018e44e8263118fae02bee

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    42KB

    MD5

    3bb24e4a55c10262ced7bbb4f9f59fbc

    SHA1

    d36e7a0af77f809b3169750dfa322dab368e25ce

    SHA256

    a49f0210c304987895ea6c7ace967924df1bd05d694d82cafabf3b71ce4e8bd6

    SHA512

    3a688233cdc0c858a1c78bcb2856f726fd92883a04699fcce97cd6bcdda714a50ae7590705062b8aa3e35ac0c86d619d79e0d76ddd018e44e8263118fae02bee

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    42KB

    MD5

    3bb24e4a55c10262ced7bbb4f9f59fbc

    SHA1

    d36e7a0af77f809b3169750dfa322dab368e25ce

    SHA256

    a49f0210c304987895ea6c7ace967924df1bd05d694d82cafabf3b71ce4e8bd6

    SHA512

    3a688233cdc0c858a1c78bcb2856f726fd92883a04699fcce97cd6bcdda714a50ae7590705062b8aa3e35ac0c86d619d79e0d76ddd018e44e8263118fae02bee

  • memory/3064-17-0x00000000005D0000-0x00000000005D6000-memory.dmp

    Filesize

    24KB

  • memory/3064-18-0x00000000005B0000-0x00000000005B6000-memory.dmp

    Filesize

    24KB

  • memory/4968-0-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/4968-1-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/4968-2-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB