Analysis

  • max time kernel
    146s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-01-2024 22:56

General

  • Target

    2024-01-18_7632cef317d33f9cc20c82279ca43acb_cryptolocker.exe

  • Size

    67KB

  • MD5

    7632cef317d33f9cc20c82279ca43acb

  • SHA1

    96da537093904ad54f1807ae8fac62951f8bdd34

  • SHA256

    74c3ce4746fd10a7951dcdd10f8a8922566653bc936dffaedc53b84b9ec15d97

  • SHA512

    7aa29122b120f144f1c9cf97e1bce919db0089233e50851881604f11ad4466af9b9257f010438ccf1af91ee6bc601dd0c9152e5619767c24310151e686da385d

  • SSDEEP

    1536:Dk/xY0sllyGQMOtEvwDpjwycDtKkQZQRKb61vSbgZ3QzNKU4:DW60sllyWOtEvwDpjwF85S

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-18_7632cef317d33f9cc20c82279ca43acb_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-18_7632cef317d33f9cc20c82279ca43acb_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3652
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:4824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    67KB

    MD5

    6285e16faf5048fe53aca01671e58e41

    SHA1

    ed7469d9c2e99a764a7b6afc1488829d8e0e1b68

    SHA256

    c144ec4105ff2e26824d30e48f4d72e4acc84010f009820d72a9557cf321cab2

    SHA512

    c6d4acb723972143620518fa35b61d0b245de91157fbacd06f7987d73d0d109a1b8d0f53093f165d3121adb6e8327e7a0b6f1eb31204f60bcedad2effb676bbe

  • memory/3652-0-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/3652-1-0x00000000005F0000-0x00000000005F6000-memory.dmp

    Filesize

    24KB

  • memory/3652-2-0x00000000005F0000-0x00000000005F6000-memory.dmp

    Filesize

    24KB

  • memory/3652-3-0x0000000000610000-0x0000000000616000-memory.dmp

    Filesize

    24KB

  • memory/3652-18-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/4824-17-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/4824-20-0x0000000000590000-0x0000000000596000-memory.dmp

    Filesize

    24KB

  • memory/4824-25-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB