Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/01/2024, 20:24

General

  • Target

    2024-01-24_5782824b591752d38e18a18b4376dc08_cryptolocker.exe

  • Size

    72KB

  • MD5

    5782824b591752d38e18a18b4376dc08

  • SHA1

    46bd7a6c1f5afbd99f6b6cdc834e73f2778ca3a8

  • SHA256

    cf3400cfe838895dddb9d6de862ec3fe992dc6f881724b8c669b10eca24fe7dd

  • SHA512

    4b73193bc739f6cac1bf7667bae9edd831d3ce6ec03c90909fad1935d088985622b10cf03133d5bd8510ae61a25901b93893c98626d9b675c2b1c032708b2580

  • SSDEEP

    1536:X6QFElP6n+gJQMOtEvwDpjBZYTjipvF2bx1Ru:X6a+SOtEvwDpjBZYvQd2E

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-24_5782824b591752d38e18a18b4376dc08_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-24_5782824b591752d38e18a18b4376dc08_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4540
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2200

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    73KB

    MD5

    e3ccbb8ee85e45b31ccbbdd25ef4e065

    SHA1

    209595cd04b89c078a6d1621b8d579b7a644ecd6

    SHA256

    cf70a6ad53022db09b66c43932c694db41942e781a5bd89cbe517c82b29eee5d

    SHA512

    9f166775ff922fb1f02f1b9bbde4c2764aba04a131d2ad3ea134de305fb8683a3aee10bc61753813be174517ac2c8d072d91455728ac25804cbad6b3dacf5f49

  • memory/2200-17-0x0000000001FF0000-0x0000000001FF6000-memory.dmp

    Filesize

    24KB

  • memory/2200-19-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB

  • memory/4540-0-0x00000000007C0000-0x00000000007C6000-memory.dmp

    Filesize

    24KB

  • memory/4540-1-0x00000000007C0000-0x00000000007C6000-memory.dmp

    Filesize

    24KB

  • memory/4540-2-0x00000000007E0000-0x00000000007E6000-memory.dmp

    Filesize

    24KB