Analysis

  • max time kernel
    152s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-01-2024 05:49

General

  • Target

    2024-01-09_0169cd3a7069390af706dd59dab25c0f_cryptolocker.exe

  • Size

    43KB

  • MD5

    0169cd3a7069390af706dd59dab25c0f

  • SHA1

    d35f25fbd724a346c9f52009128660d72faa5189

  • SHA256

    138af22dc669b2591597e700847c762751ae1afe354468f80b66841e72110e00

  • SHA512

    7abb801bc576d3e8e2e5536b417d04af2e6cb7124cc7ddbc1ee6b9089fa536d6f74849589bbd07543c34c25c9d554209bbda99c9d7bd4529fd723bcdce9fc062

  • SSDEEP

    768:wHGGaSawqnwjRQ6ESlmFOsPoOdQtOOtEvwDpjm6j4AYsqSh+DETkedm+YUDD:YGzl5wjRQBBOsP1QMOtEvwDpjl39+D+1

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-09_0169cd3a7069390af706dd59dab25c0f_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-09_0169cd3a7069390af706dd59dab25c0f_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4508
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:4884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    43KB

    MD5

    8d3d7ea9f668779c6f02779f6e295f97

    SHA1

    39731af2f85fcb153c92ac250d455753c1b42ea1

    SHA256

    48325f1fd825f5d41d426be2ad0703a6edfe28acd685fd138ff2da7453ffedb8

    SHA512

    ac307d74b45b713b4f882e7831b53286738729e5ac249b1467068e306aab89b9d57e6d986b3659122e03bd583fd6076dcf2f798e59f8e22fb40651bfaba57c2e

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    38KB

    MD5

    c1ded840c52ff9eef5e205a6c211bae0

    SHA1

    442676d7f9271946f51a21833235ad0525300b61

    SHA256

    51d9175caba0f78f191f4998872cf23e873ccc452dfd70b8abb25bd1fc9dabf1

    SHA512

    9c0be99f40b36fc389863776bf56a32ca5f84aaf76f20e44aa4dbe777b7135f828c1134174b3ba98c792a8c76d640450da87d11988f5c02eaf5b20709500e53e

  • memory/4508-0-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/4508-2-0x0000000000570000-0x0000000000576000-memory.dmp

    Filesize

    24KB

  • memory/4508-1-0x0000000000570000-0x0000000000576000-memory.dmp

    Filesize

    24KB

  • memory/4508-3-0x0000000002070000-0x0000000002076000-memory.dmp

    Filesize

    24KB

  • memory/4508-17-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/4884-19-0x0000000000760000-0x0000000000766000-memory.dmp

    Filesize

    24KB

  • memory/4884-25-0x0000000000740000-0x0000000000746000-memory.dmp

    Filesize

    24KB