Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-01-2024 05:30

General

  • Target

    2024-01-27_a860573bec1afca70e912ee46ef21758_cryptolocker.exe

  • Size

    69KB

  • MD5

    a860573bec1afca70e912ee46ef21758

  • SHA1

    663978e8c3da3b4a8b78c13fa4cbc823556b3712

  • SHA256

    874006fc633da44aac0f7ad9b8f60f6acfb4b0f07cfe45af5233225121ab3012

  • SHA512

    6f6510f91057a79d29666a9d70a5912eb890501bfb7375138093a2acd97ebbd4adae47c8a07d64f46feb51c4bffe4995e24c39b45a1b42751b4a738c266f6d61

  • SSDEEP

    1536:Dk/xY0sllyGQMOtEvwDpjwycDtKkQZQRKb61vSbgZ3QzNKUtbUu:DW60sllyWOtEvwDpjwF85R

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 3 IoCs
  • Detection of Cryptolocker Samples 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-27_a860573bec1afca70e912ee46ef21758_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-27_a860573bec1afca70e912ee46ef21758_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1888
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:1768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    69KB

    MD5

    8d5d72a9077d7c26a9ca979d017940f8

    SHA1

    1eacbbf3cdcc5cc9370e9bf8be8d4479fc1dc275

    SHA256

    ca2ebb4205cd0938488ba4e569f83d3f38c984a12d8798bdd39000173d0a57e5

    SHA512

    a02ddeee8a27b759549776d268758eb4109718cbfa306b35fdee01d081d1f259b4f00e632545f724a8d37b9b3b279567ceb5e26b567d3212bc076c98a8773186

  • memory/1768-19-0x0000000002080000-0x0000000002086000-memory.dmp

    Filesize

    24KB

  • memory/1768-25-0x0000000000800000-0x0000000000806000-memory.dmp

    Filesize

    24KB

  • memory/1888-0-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/1888-1-0x00000000021D0000-0x00000000021D6000-memory.dmp

    Filesize

    24KB

  • memory/1888-2-0x00000000021D0000-0x00000000021D6000-memory.dmp

    Filesize

    24KB

  • memory/1888-3-0x0000000002060000-0x0000000002066000-memory.dmp

    Filesize

    24KB

  • memory/1888-17-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB