Analysis

  • max time kernel
    0s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/01/2024, 06:42

General

  • Target

    2024-01-08_69a9e996d37f132bddd2707939103e09_cryptolocker.exe

  • Size

    89KB

  • MD5

    69a9e996d37f132bddd2707939103e09

  • SHA1

    7224c2c6bebbdf293e91248fcd1281e4cba9b37c

  • SHA256

    7985f6b2798fefecf6f87636581f384766b3d4e2b35698abc5c0a6597a228ea3

  • SHA512

    7d107cf3664f218cb3cd19237e89d24679715d0832acf76297712821f58154ce4694ac96d618c58698d0f547bd2526d637963991f68610ae8a11193fe305935a

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjQGYQbNcqamvWHShl/3/C:V6a+pOtEvwDpjtw

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-08_69a9e996d37f132bddd2707939103e09_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-08_69a9e996d37f132bddd2707939103e09_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4704
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:4444

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          89KB

          MD5

          7ef7a6f5b9e018f92927eb25010e0519

          SHA1

          ab72ab3e9e83ca7cc2928307c0e0a3d6caabac48

          SHA256

          c45ef5f15f8cdaf38165ec20c2d5aa2294c62a20839c4df0c6d2aededa298bf4

          SHA512

          2d9b61b48b2063b3f2e9cb58de0c4bac35c261c1e55418495ad8260162861c0033e8d4c121e8d25b43d5407b8110ed6730739efdfdcf1513f6894967151c4a70

        • memory/4444-17-0x0000000002070000-0x0000000002076000-memory.dmp

          Filesize

          24KB

        • memory/4444-21-0x00000000005B0000-0x00000000005B6000-memory.dmp

          Filesize

          24KB

        • memory/4704-2-0x0000000000590000-0x0000000000596000-memory.dmp

          Filesize

          24KB

        • memory/4704-1-0x00000000004D0000-0x00000000004D6000-memory.dmp

          Filesize

          24KB

        • memory/4704-0-0x00000000004D0000-0x00000000004D6000-memory.dmp

          Filesize

          24KB