Analysis

  • max time kernel
    156s
  • max time network
    179s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/01/2024, 05:57

General

  • Target

    2024-01-09_913f3f792ccc3bb7907349cd5eb8eee9_cryptolocker.exe

  • Size

    49KB

  • MD5

    913f3f792ccc3bb7907349cd5eb8eee9

  • SHA1

    6feeed46cdc0588d78bda1c28f797880dbd59991

  • SHA256

    f23a291c75ea0cd4ae6a17217e0562838c9ce2bbf18949fc091760c91b477a1f

  • SHA512

    a5b1b0933bc40b74006e7e0baca976f2e590b4f9fe1d437ccad68355d7f5091e860ee24af41b26fcb9447c7a794929e1e70155f2956f95badb147769c825fce0

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/BtOOtEvwDpjBVaD3E09vaTCFWpzF:X6QFElP6n+gJBMOtEvwDpjBtEc

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-09_913f3f792ccc3bb7907349cd5eb8eee9_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-09_913f3f792ccc3bb7907349cd5eb8eee9_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:376
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:3760

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          50KB

          MD5

          75e671afcd0a5e25caa746f83f6f1b3e

          SHA1

          eea6b104dc629f2e4eb5309eaa55ef33cd4d067c

          SHA256

          31e67636a34fd128f81fab887f45712e0e9dc9ede00c1256a2edbdcc2261f3ea

          SHA512

          d0c432f6dcb59de48b310124947dc9fe8b13678a9dab3f49b076147ea2ace3f507893efe11561b55cb427260e0aedca9a561916fd00ca165ead2279f37d7afd2

        • memory/376-0-0x00000000004D0000-0x00000000004D6000-memory.dmp

          Filesize

          24KB

        • memory/376-1-0x00000000004D0000-0x00000000004D6000-memory.dmp

          Filesize

          24KB

        • memory/376-2-0x00000000004F0000-0x00000000004F6000-memory.dmp

          Filesize

          24KB