Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/01/2024, 20:58

General

  • Target

    2024-01-23_c9ec9d23684b2bacb1787be9d5dde2c2_cryptolocker.exe

  • Size

    50KB

  • MD5

    c9ec9d23684b2bacb1787be9d5dde2c2

  • SHA1

    74896f15b499ea00d39215f3884f2ea46950554d

  • SHA256

    464e7236ec21b33ac1593d9e587c7f8f867b240966c60c9b52a7fa0a55bfa1f8

  • SHA512

    81e1c880e27aca8fdf2b33ef9fc71dfdb745af2688efe8b4455413ef8e1cce647011adb99b89ee3db4dc77c5ba9a51e81c397dc84e165df84cb514c82ae4cfaf

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjeJQ7pojaklo1:V6a+pOtEvwDpjF

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-23_c9ec9d23684b2bacb1787be9d5dde2c2_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-23_c9ec9d23684b2bacb1787be9d5dde2c2_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:932
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:1756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    50KB

    MD5

    27a2f38dd85183fbc461d1c94754964a

    SHA1

    4e31cf4369058e1da6320bc583a9583e565adc37

    SHA256

    fbb5c73c759451fca3ea4d46aac5b8f9366042335bf9d90e827ef622dd9ed040

    SHA512

    8bd1ac8dff4ecb1ce8c6b865c698dc8e65ff6891978d454096a8f3bb555ab16b21be3d24768f992ff3f3315c52fb0f8ad219026c5a96d469c4ae0217488f3056

  • memory/932-0-0x00000000020D0000-0x00000000020D6000-memory.dmp

    Filesize

    24KB

  • memory/932-2-0x00000000020F0000-0x00000000020F6000-memory.dmp

    Filesize

    24KB

  • memory/932-1-0x00000000020D0000-0x00000000020D6000-memory.dmp

    Filesize

    24KB

  • memory/1756-23-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/1756-17-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB