Analysis

  • max time kernel
    149s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/01/2024, 05:59

General

  • Target

    2024-01-10_f7d008d21e8e7c61b3be26723532381b_cryptolocker.exe

  • Size

    30KB

  • MD5

    f7d008d21e8e7c61b3be26723532381b

  • SHA1

    6f0813c1bb901ac103c6b7dc7f3da877ca3f25b5

  • SHA256

    c7ca9c3c72d6b05fbf3a19ca0688d2597c0e890426d4c6a4be03f804e59511fd

  • SHA512

    bd0b266ad507e1c8799b391f43b3cc7ceabd7e133c03a63534125118592c227747b064c7b683794e814043906455165a19ef6bf76033f401c7c79f2d8fcdb12d

  • SSDEEP

    768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIO/xNw0LuE:q0zizzOSxMOtEvwDpj/arzN

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-10_f7d008d21e8e7c61b3be26723532381b_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-10_f7d008d21e8e7c61b3be26723532381b_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1200
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:3608

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          31KB

          MD5

          6cd21ed9de8bbe4fea30d0d19c214120

          SHA1

          fc568951ed4896d8919cbb62abd9f79888372854

          SHA256

          5b8d7549a75f8e92bba073e710f8ffae2608564a304088820b633bb5d623ec15

          SHA512

          6e3e1e2c545a8a54f5b404698445191ac14a0e7025c88aa3dc32516e73ec66c377d486ba376c58eb29fae5785ce75ecff980a3ecb53a18c65b897c0400f9c1ee

        • memory/1200-0-0x0000000000500000-0x0000000000510000-memory.dmp

          Filesize

          64KB

        • memory/1200-3-0x0000000002180000-0x0000000002186000-memory.dmp

          Filesize

          24KB

        • memory/1200-2-0x0000000002290000-0x0000000002296000-memory.dmp

          Filesize

          24KB

        • memory/1200-1-0x0000000002290000-0x0000000002296000-memory.dmp

          Filesize

          24KB

        • memory/1200-17-0x0000000000500000-0x0000000000510000-memory.dmp

          Filesize

          64KB

        • memory/3608-26-0x00000000006B0000-0x00000000006B6000-memory.dmp

          Filesize

          24KB

        • memory/3608-20-0x0000000001FF0000-0x0000000001FF6000-memory.dmp

          Filesize

          24KB

        • memory/3608-18-0x0000000000500000-0x0000000000510000-memory.dmp

          Filesize

          64KB

        • memory/3608-27-0x0000000000500000-0x0000000000510000-memory.dmp

          Filesize

          64KB