Analysis

  • max time kernel
    142s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/01/2024, 09:47

General

  • Target

    2024-01-25_e004592f1114022d6dd1c1e7f0670365_cryptolocker.exe

  • Size

    68KB

  • MD5

    e004592f1114022d6dd1c1e7f0670365

  • SHA1

    3714f8726197d1d3b0416398e0158167a9d990ef

  • SHA256

    010ea40ed3a7a323590c91b454d0f92c4602e569457532983218014c0cd84fc6

  • SHA512

    6f0d9a5143dd53dd08edefc29641479c1860a904c3d858bde494f59ace8d531992e68dbb6580f9f8a16e0444ffbbebf05b30ba32fed9725b7469f08047b78b09

  • SSDEEP

    1536:Dk/xY0sllyGQMOtEvwDpjwycDtKkQZQRKb61vSbgZ3QzNKUG:DW60sllyWOtEvwDpjwF85E

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 3 IoCs
  • Detection of Cryptolocker Samples 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-25_e004592f1114022d6dd1c1e7f0670365_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-25_e004592f1114022d6dd1c1e7f0670365_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4144
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2420

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    68KB

    MD5

    7ff3c6d613e57368a04ac061d7feab08

    SHA1

    3f98f8607ab0992f877e3d723b77261c85003047

    SHA256

    3fbb9c5c3d3fe510c479286e51bc8ae72d675a13fad40a98d04b02cdb188be79

    SHA512

    5d6a61f479275a9e63fd1ef6fda6aecf3c751a04d3de0c6dfa81906e16f28cb151ca7b550eb5eee23c09ab7cdcb1355ab2e4db09f62811818b3d620716eb4c83

  • memory/2420-19-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/2420-22-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/4144-0-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/4144-1-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB

  • memory/4144-2-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB

  • memory/4144-3-0x0000000002080000-0x0000000002086000-memory.dmp

    Filesize

    24KB

  • memory/4144-18-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB