Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/01/2024, 11:22

General

  • Target

    2024-01-27_00251473e2b3a371b8081c0404aa1c1c_cryptolocker.exe

  • Size

    94KB

  • MD5

    00251473e2b3a371b8081c0404aa1c1c

  • SHA1

    4265fe0713f5bbadbdd678883b4fea14f2eb578f

  • SHA256

    4fa958cdab0abea48ce4e9418b1343cc721ae73fe394c03be09f09d9bceaa450

  • SHA512

    0736c0a689513c2d9489932547fa929406240c95a9dca6355460ceacc81d024cd69114724cd5c22233f33468a859890d1387dfe44fbfb0c644d06a13a6198a3a

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp015:AnBdOOtEvwDpj6z7

Score
9/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 4 IoCs
  • UPX dump on OEP (original entry point) 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-27_00251473e2b3a371b8081c0404aa1c1c_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-27_00251473e2b3a371b8081c0404aa1c1c_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4940
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:4760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    94KB

    MD5

    118fd940c21516f5768d9a7e10671e34

    SHA1

    de2514628a121a8212359f0e861be0acb9c6a41d

    SHA256

    3ffeb4e33f5db419140e01b0a9524fddf3c13c32546018bd57853307889d33b7

    SHA512

    1f820727a25ea696d1cb0d874df472fe235b62388c3418ee3300e275fcdd8a90480cab1f87c67a9236f3aa2ac4628be82a010f996b5e86695204003e5032331d

  • memory/4760-19-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/4760-23-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/4760-26-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/4940-0-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/4940-1-0x0000000000520000-0x0000000000526000-memory.dmp

    Filesize

    24KB

  • memory/4940-2-0x0000000000520000-0x0000000000526000-memory.dmp

    Filesize

    24KB

  • memory/4940-3-0x0000000002230000-0x0000000002236000-memory.dmp

    Filesize

    24KB

  • memory/4940-17-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB