Analysis

  • max time kernel
    136s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/01/2024, 15:32

General

  • Target

    2024-01-22_a40c5c4b1fc23c14704134cca5a6b109_cryptolocker.exe

  • Size

    96KB

  • MD5

    a40c5c4b1fc23c14704134cca5a6b109

  • SHA1

    0beff64fbe826a6b6ac3ddc1ed34ade716dada48

  • SHA256

    0425da3498bcea441844048ab16e07288cf92a36a6156af050ff29e12afa7e58

  • SHA512

    d9b5d33e0ba7b9bf6534f2e8fe63cca818c076172b37769b7dd1ff923340321b7747d57675176cb50a8a1511654b2eff02a4d2957657f3a44574336700fc5738

  • SSDEEP

    1536:26QFElP6n+gBQMOtEvwDpjQGYQbN/PKwNCJ0:26a+2OtEvwDpjtzp

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-22_a40c5c4b1fc23c14704134cca5a6b109_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-22_a40c5c4b1fc23c14704134cca5a6b109_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:444
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:3120

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    96KB

    MD5

    12a221277e1ea09e03fa9ce306383793

    SHA1

    c01b13909a8826882dffc5bc41fffb0e28c3a65b

    SHA256

    e7fbbe1f13c1fa2445b637e79ce2047eba0aa826ef12d20ec85acf6e3fae6b27

    SHA512

    9796cb986170747f887f249284f94de0eaa80c4854ea5869086ee6ff7849b95db407c55d101652f3b76cf6dcaa5818ccf32738d7e36cb6f79ed4fac571e86318

  • memory/444-0-0x00000000006B0000-0x00000000006B6000-memory.dmp

    Filesize

    24KB

  • memory/444-1-0x00000000006B0000-0x00000000006B6000-memory.dmp

    Filesize

    24KB

  • memory/444-2-0x00000000006D0000-0x00000000006D6000-memory.dmp

    Filesize

    24KB

  • memory/3120-17-0x0000000000520000-0x0000000000526000-memory.dmp

    Filesize

    24KB

  • memory/3120-18-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB