Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-01-2024 17:44

General

  • Target

    2024-01-25_2a19eede904690a3381a9cf82e1745b3_cryptolocker.exe

  • Size

    55KB

  • MD5

    2a19eede904690a3381a9cf82e1745b3

  • SHA1

    9c80343a80cc6182709d4ba8fb425db9f36911bd

  • SHA256

    43030d71b82db253e26877eacdc6547dca5b4f8dba8dc794161cbeb30150b23f

  • SHA512

    3b4b868cca83068016f7c073e959117b7f02601476176a2589213c98afe8651bbe62f800a91ee5c0e00ac370b3accd6a3164114e5f3eb4446574ee1c25f720de

  • SSDEEP

    768:79inqyNR/QtOOtEvwDpjBK/iVTab3GRuv3VylsPxAu:79mqyNhQMOtEvwDpjBPY7xv3gy5V

Score
10/10

Malware Config

Signatures

  • Kinsing

    Kinsing is a loader written in Golang.

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-25_2a19eede904690a3381a9cf82e1745b3_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-25_2a19eede904690a3381a9cf82e1745b3_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2772
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    55KB

    MD5

    ca1c45ce8579fcf36e3f3d5b4322038b

    SHA1

    b954e6143c70340f330180883f5bcdb3d6c7ddb5

    SHA256

    a056500731131b8c009812b32453e2f4f50a969ff02ad8625d5ef275a3db130d

    SHA512

    2ca91fa2ba98a3f358bf4eb7c887c2bac3ac04afaa17659ef117ae8636b70edec9c00f620326e9c2cb9c1f9bea7a6d5b367055fcb5d23157fe5ee138d3240502

  • memory/2772-0-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/2772-2-0x00000000007F0000-0x00000000007F6000-memory.dmp

    Filesize

    24KB

  • memory/2772-1-0x00000000007F0000-0x00000000007F6000-memory.dmp

    Filesize

    24KB

  • memory/2772-3-0x0000000002240000-0x0000000002246000-memory.dmp

    Filesize

    24KB

  • memory/2772-18-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/2832-20-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/2832-26-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/2832-17-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB