Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-01-2024 04:54

General

  • Target

    2024-01-24_fe0abbc522ec07ddb7f9524ecb5c6405_cryptolocker.exe

  • Size

    71KB

  • MD5

    fe0abbc522ec07ddb7f9524ecb5c6405

  • SHA1

    b5a67ec7415dbee8b8b03cfb9e18ea8c14746bc4

  • SHA256

    818fffbd3042fe19d7094e41bd3f24bf583226dea13a122eb96c3aea16b80c4d

  • SHA512

    476be20fded8f6aa42d0119016585b6325421b1b15bf7c15d7aa8a86851f18c2ab09b03876c07b61de7f903bd3feb3d8706caf34ddab7470932964ca5b1d1961

  • SSDEEP

    1536:X6QFElP6n+gJQMOtEvwDpjBZYTjipvF2bx1bk:X6a+SOtEvwDpjBZYvQd2Y

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-24_fe0abbc522ec07ddb7f9524ecb5c6405_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-24_fe0abbc522ec07ddb7f9524ecb5c6405_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2304
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:3540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    71KB

    MD5

    d668419833c92a07d5a0001b1f2d96d5

    SHA1

    ed6c75156b07a74c44fce573faf60fa3b0d8dad3

    SHA256

    ea9c5f6e0e1360bbab2d1716771eaca033e30955b21ff189a9741b352e01b105

    SHA512

    608dc0425d7b04bb782f1579b612337a57f147815b6f2ca039f7183a3fb28059cab2f86ad6a65d72115081f76c6400656ea8282c8a52e9dce4c15ca974bfbd60

  • memory/2304-1-0x0000000000660000-0x0000000000666000-memory.dmp

    Filesize

    24KB

  • memory/2304-0-0x0000000000660000-0x0000000000666000-memory.dmp

    Filesize

    24KB

  • memory/2304-2-0x0000000000790000-0x0000000000796000-memory.dmp

    Filesize

    24KB

  • memory/3540-17-0x0000000000520000-0x0000000000526000-memory.dmp

    Filesize

    24KB

  • memory/3540-18-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB